+ All Categories
Home > Documents > Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G...

Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G...

Date post: 14-Oct-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
22
arXiv:2002.03491v2 [cs.IT] 3 Aug 2020 1 Massive Access for 5G and Beyond Xiaoming Chen, Senior Member, IEEE, Derrick Wing Kwan Ng, Senior Member, IEEE, Wei Yu, Fellow, IEEE, Erik G. Larsson, Fellow, IEEE, Naofal Al-Dhahir, Fellow, IEEE, and Robert Schober, Fellow, IEEE Abstract—Massive access, also known as massive connectivity or massive machine-type communication (mMTC), is one of the main use cases of the fifth-generation (5G) and beyond 5G (B5G) wireless networks. A typical application of massive access is the cellular Internet of Things (IoT). Different from conventional human-type communication, massive access aims at realizing efficient and reliable communications for a massive number of IoT devices. Hence, the main characteristics of massive access include low power, massive connectivity, and broad coverage, which require new concepts, theories, and paradigms for the design of next-generation cellular networks. This paper presents a comprehensive survey of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access from the perspectives of theory, protocols, techniques, coverage, energy, and security. Furthermore, several future research directions and challenges are identified. Index Terms—B5G, massive access, cellular IoT, low power, massive connectivity, broad coverage. I. I NTRODUCTION The widespread applications of the Internet of Things (IoT) in a variety of fields, e.g. industry, agriculture, medicine, and traffic, have spurred an explosive growth in the number of IoT devices [1]-[4]. As of 2017, there were 8.4 billion connected devices across the world. It has been predicted that this number will surpass 75.4 billion by 2025 [5], [6]. This growth rate is tremendous and will further increase over the next decade. It is also believed that the number of IoT devices will eventually reach hundreds of billions with a connection density of 10 million devices per km 2 by 2030. This trend acts as the catalyst for speeding up the evolution of IoT to the Internet- of-Everything (IoE). To allow IoT devices to connect, interact, and exchange data anywhere and anytime, they have to be interconnected wirelessly [7]. Hence, wireless access technology providing reliable communications is the key to unleash the potential of the massive IoT. Currently, IoT devices access various wireless X. Chen is with the College of Information Science and Elec- tronic Engineering, Zhejiang University, Hangzhou 310027, China (e-mail: [email protected]). D. W. K. Ng is with the School of Electrical Engineering and Telecommu- nications, the University of New South Wales, NSW 2052, Australia (e-mail: [email protected]). W. Yu is with the Department of Electrical and Computer En- gineering, University of Toronto, Toronto M5S3G4, Canada (e-mail: [email protected]). E. G. Larsson is with the Link¨ oping University, Dept. of Electrical Engineering (ISY), 58183 Link¨ oping, Sweden (e-mail: [email protected]). N. Al-Dhahir is with the Department of Electrical and Computer Engi- neering, the University of Texas at Dallas, TX 75083-0688, USA (e-mail: [email protected]). R. Schober is with the Institute for Digital Communications, Friedrich- Alexander-University Erlangen-N¨ urnberg, 91058 Erlangen, Germany (e-mail: [email protected]). TABLE I COMPARISON OF EXISTING WIRELESS SYSTEMS SUPPORTING I OT [15]. Zigbee Bluetooth WiFi LoRa Cellular Spectrum Unlicensed Unlicensed Unlicensed Unlicensed Licensed Connectivity Moderate Small Large Massive Massive Throughput Moderate Low High High High Range Short Short Moderate Long Long Security Moderate Low Moderate High High Power Low Low High Low Low Mobility No No No Yes Yes Latency Low Low Low Low Low networks mainly via low-cost commercial technologies such as Zigbee [8], Bluetooth [9], and WiFi [10]. However, these technologies only support short-range wireless access for a moderate number of devices, e.g. a few hundred devices in an indoor environment or in a small area. Newly emerging services require IoT devices to have seamless access over a wider range. Thus, the existing technologies can only be adopted as an intermediate solution for serving a small number of IoT devices, but eventually will become a bottleneck for providing reliable wireless access to a massive number of IoT devices. On the other hand, a ubiquitous wireless infrastructure is a key enabler for realizing wide coverage for the IoT. Currently, long range radio (LoRa) and cellular IoT are two main access technologies for low power wide area networks (LPWAN) [11]-[13]. Compared to the LoRa technology, cellular IoT is more beneficial and economical for service providers as it reuses existing cellular infrastructure. In order to support massive access with a connection density of 1 million devices per km 2 with cellular networks, the 3rd generation partnership project (3GPP) has selected massive machine-type communications (mMTC) as one of three main use cases of 5G wireless networks and provided a dedicated specification for cellular IoT in Release 13 in 2015 [14]. In this specification, cellular IoT is categorized as narrow-band IoT (NB-IoT) for fixed and low-rate scenarios and LTE-machine (LTE-M) for mobile and high-rate scenarios [15]. Hence, the existing cellular network architecture and technology can serve as a solid foundation for enabling massive IoT in practice. A comparison of existing wireless systems supporting IoT is provided in Table I. The key to supporting massive IoT in cellular networks lies in designing appropriate multiple access techniques. In fact, enabling multiple access with limited system resources is an inherent issue in cellular networks. Previous and current cellular networks have employed a variety of effective multiple access techniques, such as frequency division multiple access (FDMA) in the first-generation (1G) wireless networks, time division multiple access (TDMA) in 2G, code division multi- ple access (CDMA) in 3G, and orthogonal frequency division
Transcript
Page 1: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

arX

iv:2

002.

0349

1v2

[cs

.IT

] 3

Aug

202

01

Massive Access for 5G and BeyondXiaoming Chen, Senior Member, IEEE, Derrick Wing Kwan Ng, Senior Member, IEEE, Wei Yu, Fellow, IEEE,

Erik G. Larsson, Fellow, IEEE, Naofal Al-Dhahir, Fellow, IEEE, and Robert Schober, Fellow, IEEE

Abstract—Massive access, also known as massive connectivityor massive machine-type communication (mMTC), is one ofthe main use cases of the fifth-generation (5G) and beyond5G (B5G) wireless networks. A typical application of massiveaccess is the cellular Internet of Things (IoT). Different fromconventional human-type communication, massive access aimsat realizing efficient and reliable communications for a massivenumber of IoT devices. Hence, the main characteristics ofmassive access include low power, massive connectivity, and broadcoverage, which require new concepts, theories, and paradigmsfor the design of next-generation cellular networks. This paperpresents a comprehensive survey of massive access design forB5G wireless networks. Specifically, we provide a detailed reviewof massive access from the perspectives of theory, protocols,techniques, coverage, energy, and security. Furthermore, severalfuture research directions and challenges are identified.

Index Terms—B5G, massive access, cellular IoT, low power,massive connectivity, broad coverage.

I. INTRODUCTION

The widespread applications of the Internet of Things (IoT)

in a variety of fields, e.g. industry, agriculture, medicine, and

traffic, have spurred an explosive growth in the number of IoT

devices [1]-[4]. As of 2017, there were 8.4 billion connected

devices across the world. It has been predicted that this number

will surpass 75.4 billion by 2025 [5], [6]. This growth rate is

tremendous and will further increase over the next decade. It is

also believed that the number of IoT devices will eventually

reach hundreds of billions with a connection density of 10

million devices per km2 by 2030. This trend acts as the

catalyst for speeding up the evolution of IoT to the Internet-

of-Everything (IoE).

To allow IoT devices to connect, interact, and exchange

data anywhere and anytime, they have to be interconnected

wirelessly [7]. Hence, wireless access technology providing

reliable communications is the key to unleash the potential of

the massive IoT. Currently, IoT devices access various wireless

X. Chen is with the College of Information Science and Elec-tronic Engineering, Zhejiang University, Hangzhou 310027, China (e-mail:[email protected]).

D. W. K. Ng is with the School of Electrical Engineering and Telecommu-nications, the University of New South Wales, NSW 2052, Australia (e-mail:[email protected]).

W. Yu is with the Department of Electrical and Computer En-gineering, University of Toronto, Toronto M5S3G4, Canada (e-mail:[email protected]).

E. G. Larsson is with the Linkoping University, Dept. ofElectrical Engineering (ISY), 58183 Linkoping, Sweden (e-mail:[email protected]).

N. Al-Dhahir is with the Department of Electrical and Computer Engi-neering, the University of Texas at Dallas, TX 75083-0688, USA (e-mail:[email protected]).

R. Schober is with the Institute for Digital Communications, Friedrich-Alexander-University Erlangen-Nurnberg, 91058 Erlangen, Germany (e-mail:[email protected]).

TABLE ICOMPARISON OF EXISTING WIRELESS SYSTEMS SUPPORTING IOT [15].

Zigbee Bluetooth WiFi LoRa Cellular

Spectrum Unlicensed Unlicensed Unlicensed Unlicensed Licensed

Connectivity Moderate Small Large Massive Massive

Throughput Moderate Low High High High

Range Short Short Moderate Long Long

Security Moderate Low Moderate High High

Power Low Low High Low Low

Mobility No No No Yes Yes

Latency Low Low Low Low Low

networks mainly via low-cost commercial technologies such

as Zigbee [8], Bluetooth [9], and WiFi [10]. However, these

technologies only support short-range wireless access for a

moderate number of devices, e.g. a few hundred devices in

an indoor environment or in a small area. Newly emerging

services require IoT devices to have seamless access over

a wider range. Thus, the existing technologies can only be

adopted as an intermediate solution for serving a small number

of IoT devices, but eventually will become a bottleneck

for providing reliable wireless access to a massive number

of IoT devices. On the other hand, a ubiquitous wireless

infrastructure is a key enabler for realizing wide coverage

for the IoT. Currently, long range radio (LoRa) and cellular

IoT are two main access technologies for low power wide

area networks (LPWAN) [11]-[13]. Compared to the LoRa

technology, cellular IoT is more beneficial and economical for

service providers as it reuses existing cellular infrastructure.

In order to support massive access with a connection density

of 1 million devices per km2 with cellular networks, the 3rd

generation partnership project (3GPP) has selected massive

machine-type communications (mMTC) as one of three main

use cases of 5G wireless networks and provided a dedicated

specification for cellular IoT in Release 13 in 2015 [14]. In this

specification, cellular IoT is categorized as narrow-band IoT

(NB-IoT) for fixed and low-rate scenarios and LTE-machine

(LTE-M) for mobile and high-rate scenarios [15]. Hence, the

existing cellular network architecture and technology can serve

as a solid foundation for enabling massive IoT in practice.

A comparison of existing wireless systems supporting IoT is

provided in Table I.

The key to supporting massive IoT in cellular networks

lies in designing appropriate multiple access techniques. In

fact, enabling multiple access with limited system resources

is an inherent issue in cellular networks. Previous and current

cellular networks have employed a variety of effective multiple

access techniques, such as frequency division multiple access

(FDMA) in the first-generation (1G) wireless networks, time

division multiple access (TDMA) in 2G, code division multi-

ple access (CDMA) in 3G, and orthogonal frequency division

Page 2: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

2

multiple access (OFDMA) in 4G and 5G [16]. However, it is

not a trivial task to realize massive access in B5G wireless

networks. First of all, there is a lack of information theoretic

concepts for the design of massive access. In particular, con-

ventional information theory commonly focuses on multiple

access scenarios with only a small number of devices [17],

[18]. It is not straightforward to extend the conventional

multiple access theory to massive access. In particular, short

packets are usually employed in massive access for reducing

access latency and decoding complexity at the receivers, which

requires a much more sophisticated multiple access theory

[19]. Secondly, the commonly adopted grant-based random

access protocols may lead to exceedingly long scheduling

delays and large signaling overheads [20], [21]. In fact, for

grant-based random access protocols, each device would have

to choose a preamble from a pool of orthogonal sequences for

accessing the wireless network. Due to the limited coherence

time and sequence length, the number of orthogonal sequences

is finite. As a result, in the context of massive IoT, two

or more devices would choose the same sequence with a

high probability, leading to collisions and failure of wireless

access. More importantly, the access delay inevitably increases

as the number of devices increases. Thirdly, most existing

IoT networks adopt orthogonal multiple access (OMA) tech-

niques [22]. For example, NB-IoT employs single carrier

frequency division multiple access (SC-FDMA) for the uplink

and OFDMA for the downlink. Although OMA simplifies

the transceiver design, it leads to a low spectral efficiency

in general [23]. In the context of massive IoT, applying OMA

over limited radio spectrum is challenging due to the resulting

underutilization of the system resources. Fourthly, coverage is

a critical issue for low power IoT devices. In order to prolong

the battery life of IoT devices, their transmit powers are

usually very small, e.g. 23 dBm for NB-IoT [24]. As a result,

the received signal is generally weak for signal detection if the

distance between the base transceiver station (BTS) and the

device is large. As a remedy, NB-IoT enhances the coverage

by adopting re-transmission (i.e., time diversity) and low-

order modulation (BPSK/QPSK). These techniques enhance

the service coverage at the cost of inefficient utilization of the

system resources. In other words, if the number of IoT devices

is large, the limited system resources may be insufficient for

wide coverage. Fifthly, security issues of massive access have

to be investigated carefully. Due to the broadcast nature of

wireless channels, confidential wireless signals may also be

received by unintended devices, resulting in potential infor-

mation leakage [25], [26]. Traditionally, cryptography-based

encryption techniques are employed to guarantee security

for wireless access. However, due to the fast evolution of

eavesdropping techniques in recent years, providing secure

encryption has become much more challenging. Unfortunately,

most IoT devices have limited computational capability, such

that they cannot utilize sophisticated encryption techniques.

Moreover, the limited energy supply of massive IoT is a chal-

lenging issue. Currently, most IoT devices are battery-powered

with small energy storage capacity. Thus, it is necessary to

replace the battery frequently to extend the lifetime of the

communication nodes. However, for massive IoT, frequent

battery replacement leads to a prohibitively high human cost

and environmental strain. In summary, massive access presents

many challenging unsolved issues, which cannot be addressed

with traditional approaches.

We note that the characteristics of massive access for

cellular IoT are very different from those of the other two

5G use cases, namely enhanced mobile broadband (eMBB)

and ultra-reliable low-latency communication (URLLC) [27].

In particular, eMBB aims to provide high data rates for broad-

band applications such as virtual reality (VR) or argument

reality (AR), while the objective of URLLC is to guarantee

ultra-reliable low-latency communications for critical missions

such as assisted/autonomous driving. Hence, for eMBB and

URLLC, OMA schemes are preferred to achieve high spectral

efficiency and link reliability. As pointed out above, 5G NB-

IoT also employs OMA, but as a result, it cannot fully realize

the goal of massive access [28]. For example, NB-IoT can only

accommodate fifty thousand devices per cell supporting a low

data rate [29]. For this reason, the ambitious goals of 5G NB-

IoT have to be realized by B5G cellular IoT. Without doubt,

the biggest challenge for B5G cellular IoT is the design of

effective multiple access schemes that meet the correspond-

ing performance requirements and services characteristics.

In Table II, we compare the performance requirements of

5G NB-IoT and B5G cellular IoT. Compared to 5G NB-

IoT, B5G cellular IoT imposes much more stringent require-

ments on power, connectivity, and coverage. Achieving these

performance requirements using traditional multiple access

techniques is very challenging. For example, it is challenging

to realize wide coverage with low transmit power. Hence,

new theoretical concepts, protocols, and techniques have to

be developed for B5G cellular IoT to realize massive access.

The research on B5G cellular IoT has already begun in

academia and industry. In [30], possible multiple access proto-

cols for B5G cellular IoT were surveyed, with a focus on grant-

free random access protocols based on approximate message

passing (AMP) algorithms. Massive multiple-input multiple-

output (MIMO) techniques for supporting cellular IoT were

reviewed in [31], and corresponding research opportunities

and challenges were identified. Moreover, as a promising

approach for B5G cellular IoT, non-orthogonal multiple access

(NOMA) was discussed in detail in [32]. A common viewpoint

of previous research is that B5G cellular IoT should further

exploit degrees of freedom in the spatial, frequency, and user

domains to facilitate significant performance improvements

[33]-[35]. Generally speaking, previous survey papers have

focused on one particular perspective of massive access, but

do not provide a comprehensive overview of massive access

in B5G cellular IoT which requires the consideration of many

different aspects. To accelerate the development of massive

access for the forthcoming B5G wireless networks, a com-

prehensive survey of the existing results, which can serve as

building blocks for new research on next-generation cellular

IoT, is necessary.

The objective of this paper is to provide such a compre-

hensive overview of the latest results and progress on massive

access in B5G wireless networks, c.f. Fig. 1. The remainder

of this paper is organized as follows. Section II introduces

Page 3: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

3

Mas

sive

Acc

ess

Access Theory

Access Protocol

Access

Technique

Coverage

Enhancement

Grant-based

Random Access

Grant-Free

Random Access

CS-based

Detection

Covariance-

based Detection

Optimization

Algorithms

Bayesian

Approaches

Orthogonal

Access

Non-Orthogonal

Access

Outdoor

Indoor

Rural

Massive Random

Access

Massive Short-

Packet Access

Massive MIMO

mmW/THz

PD-NOMA

CD-NOMA

LDS

SCMA

Related Topics

Energy Supply

Access Security

Unsourced

Random Access

Sensing Matrix

Design

MUSA

Greedy

Algorithms

Fig. 1. Illustration of the aspects of massive access in B5G wireless networks considered in this survey paper. The labels of the rectangles correspond to the(sub)section titles.

TABLE IICOMPARISON OF 5G NB-IOT AND B5G CELLULAR IOT [36].

5G NB-IoT B5G Cellular IoT

Connectivity 50 thousand per cell 10 million per km2

Battery life 10 years 20 years

Coverage Ground Space-air-ground-sea

Latency 1 ms 0.3 ms

Reliability 10−4 10−6

Positioning 100 m 1 m for outdoor and 10 cm for indoor

massive access in cellular IoT. Then, Section III investigates

massive access from the perspective of information theory.

Massive access protocols, massive access techniques, and mas-

sive coverage enhancement are discussed in Sections IV, V and

VI, respectively. Moreover, energy supply for massive access

and massive access security are considered in Section VII.

Furthermore, future potential research directions for massive

access are described in Section VIII. Finally, Section IX

concludes the paper.

II. MASSIVE ACCESS IN CELLULAR IOT

Wireless access refers to the last-mile connection between

distributed end devices and a central station (e.g., a BTS).

Due to the limited radio spectrum, multiple wireless devices

have to share the same bandwidth employing multiple access

techniques. In general, the performance of multiple access is

determined by various factors such as channel conditions and

device requirements. First, the wireless channel may experi-

ence fading, interference, and noise, which can significantly

affect both access efficiency and reliability. Second, since mul-

tiple access schemes have to coordinate multiple devices, the

Page 4: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

4

Fig. 2. Cellular IoT based on B5G wireless networks will be applied invarious fields, e.g., industry, agriculture, traffic, and medicine.

quality-of-service (QoS) requirements of the devices, e.g., rate

and latency, affect the selection of suitable access protocols

and techniques. Hence, the design of multiple access is always

a nontrivial issue. In B5G cellular IoT, c.f. Fig. 2, the evolution

from multiple access to massive access is driven by not only

the envisioned massive number of IoT devices, but also the

following critical service characteristics [37], [38]:

• Sporadic traffic: IoT devices do not always have data to

transmit creating bursty wireless traffic. In order to save

energy, idle devices do not access the network. In general,

a random number of devices access the network in each

time slot.

• Small payload: Most IoT applications infrequently gener-

ate small volumes of data having different sizes. In order

to improve the resource utilization efficiency, short-packet

transmission is preferable.

• Low power: Ideally, the batteries of IoT devices should

last for more than 20 years. Therefore, IoT devices have

to employ an intelligent transmit power strategy to reduce

the power consumption.

• Ubiquitous distribution: In order to support various ap-

plications, IoT devices are distributed over a wide range,

not only in urban areas, but also in rural areas. Hence,

wide wireless coverage is needed.

• Limited capability: Most IoT devices are wireless nodes

with simple architecture, and limited/no energy storage.

In other words, IoT devices cannot afford sophisticated

signal processing operations.

• Stringent latency constraint: Some IoT applications im-

pose stringent latency requirements. Low-latency access

schemes are needed to satisfy the latency requirements

of such IoT applications.

• Heterogenous QoS requirements: IoT devices across dif-

ferent application fields are very heterogeneous. For

example, a small sensor for temperature sensing and

a vehicle in a smart traffic system have very different

QoS requirements, leading to different requirements for

wireless access.

In general, massive access in B5G cellular IoT requires

low power, massive connectivity, and broad coverage. Yet,

the wireless channels for the last-mile connection between

distributed end devices and the central station constitute a

1R

2R

( )2C P

2

11

PCP

æ öç ÷+è ø

1

21

PCP

æ öç ÷+è ø

( )1C P

Fig. 3. The capacity region of the two-transmitter MAC.

major bottleneck in meeting these performance requirements.

First, the spectrum available in current wireless networks is

limited. Second, the coherence time of wireless channels is

also limited. For mobile applications such as smart traffic, the

coherence time becomes very short [39]. The length of the

coherence time constrains the length of a data frame, which

limits the performance of massive access. Moreover, for short

coherence times, it is difficult to obtain full channel state

information (CSI) for massive IoT and in some extreme sce-

narios with high mobility, CSI may not be available at all. In

such cases, non-coherent transmission which does not require

CSI may be adopted [40]. However, non-coherent transmission

suffers from a performance degradation compared to ideal

coherent transmission [41]. In summary, its unique character-

istics and the properties of the underlying wireless channels

lead to many challenging issues for realizing massive access.

In the following sections, we introduce potential solutions

from the perspectives of theories, techniques, and coverage

enhancement.

III. MASSIVE ACCESS THEORIES

Information theory is the foundation of modern commu-

nications and can provide useful guidelines for the design

of emerging wireless communication systems. To embrace

the challenges introduced by massive access, we first revisit

the capacity of the classical multiple access channel (MAC).

For the conventional MAC, the channel capacity has been

extensively studied [42]-[44]. It has been proven that the

capacity region of a K-transmitter MAC with unit channel

gain from each transmitter to the receiver can be characterized

by [45]

k∈SRk < C

(

k∈SPk

)

, ∀S ⊆ {1, · · · ,K}, (1)

where Rk and Pk are the kth transmitter’s data rate and

transmit power, respectively. The variance of the noise is

normalized to 1 and C(x) = log2(1 + x) is the Shannon

capacity formula. In Fig. 3, we plot the capacity region of

the two-transmitter MAC. The MAC capacity can be achieved

by performing successive interference cancelation (SIC) at

Page 5: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

5

the receiver. For example, to achieve one corner point of

the capacity region, the receiver first decodes the signal of

one transmitter treating the signals of all other transmitters

as noise and removes the decoded signal from the received

signal. Then, the receiver decodes the next transmitter’s signal

treating the signals of the remaining transmitters as noise

and removes the decoded signal again, until all signals are

recovered. Note that for the MAC, the average per-transmitter

channel capacity, i.e., 1K

∑K

k=1 Rk, asymptotically approaches

zero as the number of transmitters K tends to infinity. This

is because co-channel interference becomes dominant when

there is a massive number of transmitters. The conventional

MAC capacity theory is only applicable for a fixed and finite

number of transmitters. In fact, the above MAC capacity region

is derived assuming infinitely long codes requiring a very large

number of channel uses, which is incompatible with the typical

IoT use cases [45]. Considering the characteristics of B5G

cellular IoT, an information theoretical study of massive access

has to take into account the following requirements:

• Massive connectivity: There is a massive number of IoT

devices with a density of more than 10 million devices

per km2.

• Random access: The sporadic traffic generated by typical

IoT applications leads to random activity of the devices.

Only active devices request access to the cellular network.

• Short-packet transmission: The small payload of IoT

data requires short-packet transmission to achieve high

resource efficiency and low access latency.

Hence, realizing massive access in practical systems re-

quires the development of new information theoretic design

guidelines, which are quite different from the results available

for the conventional MAC. Recently, the capacity of the

massive access channel has been derived. In the following,

we review these primary results.

A. Massive Random Access

The capacity of the massive access channel was first studied

in [46] based on the new notion of the many-access channel

(MnAC). The MnAC model studies the scenario in which the

number of transmitters increases unboundedly with the block-

length of the applied forward error correction (FEC) codes,

both tending to infinity. Specifically, by applying random

coding at the transmitters and Feinstein’s threshold decoding

at the receiver, as long as the number of transmitters K grows

sublinearly with the coding blocklength M , under a maximum

power constraint P , each transmitter can send to the receiver

a message of length

v(M) =M

KC(KP ) (2)

bits with an arbitrarily small error probability if M is suffi-

ciently large. Note that v(M) in (2) is a symmetric capacity

since all transmitters achieve the same capacity. This result

addresses the limitation of the conventional MAC capacity

theory in analyzing the capacity of massive access for the case

when the number of transmitters and the blocklength both go

to infinity.

In [46], the symmetric capacity of the MnAC for the case of

known active transmitter information is derived. Equivalently,

this corresponds to the scenario where the transmitters are

always active. However, as mentioned above, the transmitters

in massive access are expected to be randomly active due to

their sporadic traffic. For the case of random activity, practical

decoding schemes adopted at the receiver have to involve two

stages. The first stage identifies the set of active transmitters

based on the superposition of their unique signatures (this

corresponds to the active device detection problem in grant-

free random access as will be discussed in Section IV). The

second stage decodes the messages of the identified active

transmitters. Intuitively, activity identification may lead to a

loss in channel capacity. In [47], it is proven that for the

MnAC with random activity, by using random coding at the

transmitters and maximum-likelihood decoding at the receiver,

if the number of transmitters K grows as fast as linearly

with the coding blocklength M , the symmetric capacity of

a transmitter is given by

w(M) =

(

M

αKC(αKP )−

H2(α)

α

)+

, (3)

where (x)+ is defined as the maximum of x and 0, 0 ≤ α ≤ 1is the probability that a transmitter is active, and H2(α) =

−α ln(α) − (1 − α) ln(1 − α). Note that the termH2(α)

αis

the difference between the MnAC capacity with and without

activity information. Hence, the cost of activity identification

is equal to the entropy of the activity probability [48].

The above papers considered the case where all nodes are

single-antenna devices. For massive access in B5G wireless

networks, both the BTS and the IoT devices may employ

multiple antennas for performance enhancement [49], [50].

Specifically, deploying multiple antennas at the BTS is gen-

erally affordable and has become standard in modern com-

munication systems. Hence, it is necessary to characterize the

capacity of the MnAC for the multiple-input multiple-output

(MIMO) case. It was shown in [51] that when the number

of transmitters grows unbounded with the coding blocklength,

the asymmetric ergodic message-length capacity of transmitter

k is given by

uk(M) = ckEH

{

log2 det

(

INR+∑

t∈AHtQtH

†t

)}

−µkKH2(α) (4)

where H† is the conjugate transpose of H, EH{x} denotes

expectation with respect to random variable H, det(·) returns

the determinant of an input matrix, and A is the set of active

transmitters. Here, Ht ∈ CNR×NT and Qt ∈ CNT×NT are

the channel matrix from the tth transmitter to the receiver

and the covariance matrix of the codeword, respectively,

ck = limM→∞

Mµk, and µk = logLk∑

t∈A

logLt, where NR is the

number of antennas at the receiver, NT is the number of

antennas at each transmitter, and Lk is the number of messages

of the kth transmitter. The first term on the right hand side of

(4) is the individual capacity of the kth transmitter if activity

information is available at the receiver. Hence, the individual

Page 6: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

6

capacity is proportional to the sum capacity with a scaling

factor ck, which depends on the number of messages. The

second term on the right hand side of (4) is the cost of activity

identification which is independent of the numbers of antennas

at the transmitters and the receiver.

B. Massive Short-Packet Access

The results in [46]-[48] and [51] on massive random ac-

cess are based on the common assumption that the coding

blocklength or the number of channel uses increases in the

same order as the number of transmitters. In this case, the

packet error rate (PER) can approach zero as the coding

blocklength tends to infinity. However, in practical systems,

the coding blocklength is finite. Especially, for cellular IoT,

short packets are preferred due to their lower latency for bursty

data communications [52], [53]. In the context of short-packet

transmission, it is difficult to guarantee error-free reception

for a short activity period. Thus, for a given packet length,

short-packet transmission should achieve a balance between

spectral efficiency and decoding error probability. Formally,

the capacity of short-packet transmission, R∗(M, ǫ, P ), can be

defined as the largest rate (log2 L)/M for which there exists

an (M, ǫ, P ) code, namely [54]

R∗(M, ǫ, P ) , sup

{

log2 L

M: ∃(M, ǫ, P )code

}

, (5)

where ǫ > 0 is the PER and L is the number of messages.

Via asymptotic analysis, it can be shown that (5) general-

izes the well-known existing capacity results. For instance,

as M → ∞, it is equivalent to Shannon’s capacity [55].

Moreover, when P tends to infinity, it is possible to obtain

the diversity-multiplexing tradeoff proposed by Zheng and Tse

[56]. However, it is challenging to derive the exact capacity

for massive short-packet access from (5) in closed form.

For the ease of analysis, a tight approximation for

R∗(M, ǫ, P ) was derived in [57] as follows

R∗(M, ǫ, P ) ≈ C(P )−

V

M

Q−1(ǫ)

ln 2, (6)

where Q−1(x) is the inverse Gaussian Q function, Q(x) =∫∞x

1√2π

exp(

− t2

2

)

dt, and V is the channel dispersion. In-

tuitively, as M tends to infinity, (6) reduces to the Shan-

non capacity formula. Based on (6), one can evaluate the

performance of massive short-packet access. Specifically, by

substituting the signal-to-interference-plus-noise ratio (SINR)

for massive short-packet access into (6), the achievable rate

for each transmitter can be evaluated.

Generally speaking, the results available for the capacity

of massive access in practical wireless networks are still

very limited. Most existing theoretical works only consider

Gaussian channels. If the channels suffer from fading and

need to be estimated, the capacities in (2) and (3) for mas-

sive random access will be quite different. Furthermore, for

massive short-packet access over fading channels, the capacity

of short-packet transmission essentially reduces to the outage

capacity [54]. A summary of existing results on massive access

information theory is given in Table III.

Active Device

Inactive Device

Fig. 4. Illustration of sporadic traffic of IoT applications. In general, duringan arbitrary time slot, only a fraction of the devices has data to transmit,namely the active devices.

IV. MASSIVE ACCESS PROTOCOLS

Due to the sporadic traffic of IoT applications, only a

fraction of the devices, namely the active devices, have data to

transmit at a given time, as shown in Fig. 4. Access protocols

are used to coordinate the access requests of the active IoT

devices [58]. Specifically, each active device contacts the BTS

to access the network. Then, the BTS identifies the active

devices by some means. Hence, an access protocol is needed

to coordinate the data exchange between the BTS and the IoT

devices. In general, the activity of the IoT devices is random.

Consequently, random access protocols are commonly used in

cellular IoT [59], [60]. Two types of random access protocols

are commonly distinguished, namely grant-based and grant-

free random access protocols [30]. Moreover, a new random

access protocol called unsourced massive random access has

been proposed recently [61]. We discuss these three massive

random access protocols in the following.

A. Grant-Based Random Access

Device BS

Fig. 5. Grant-based random access protocol.

Grant-based random access is adopted in the current 5G

NB-IoT [30]. As the name implies, for a grant-based random

Page 7: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

7

TABLE IIISUMMARY OF INFORMATION THEORETICAL RESULTS FOR MASSIVE ACCESS SYSTEMS.

Reference System model Results

X. Chen et al. [46] Massive access with known activity, long packet, single antenna v(M) = MK

C(KP )

X. Chen et al. [47] Massive access with unknown activity, long packet, single antenna w(M) =(

MαK

C(αKP ) − H2(α)α

)+

W. Fan et al. [51] Massive access with unknown activity, long packet, multiple antennas uk(M) = ckEH

{

log2 det(

INR+

t∈A HtQtH†t

)}

− µkKH2(α)

G. Durisi et al. [54] Multiple access with known activity, short packet, single antenna R∗(M, ǫ, P ) , sup{

log2 L

M: ∃(M, ǫ, P )code

}

G. Ozcan et al. [57] Multiple access with known activity, short packet, single antenna R∗(M, ǫ, P ) ≈ C(P ) −√

VM

Q−1(ǫ)ln 2

access protocol, an active device needs to obtain permission

from the BTS to access the network. As shown in Fig. 5, the

grant procedure of a typical grant-based random access pro-

tocol, such as ALOHA, includes four transmissions between

the IoT device and the BTS as follows [62]:

(1) Each active device randomly selects a preamble (also

referred to as a signature) from a pool of orthogonal

preamble sequences and uses the selected preamble to

inform the BTS that it has data to transmit.

(2) The BTS responds to each active device authorizing it to

send a connection request in the next stage.

(3) The active devices send connection requests for resource

allocation for data transmission.

(4) If a preamble is picked by only one active device, the

BTS will grant the corresponding request and send a

contention-resolution message to inform the active device

about the allocated resources. Otherwise, the access re-

quest is not granted.

The main advantage of the grant-based random access

protocol is the simple processing at the BTS. However, in

the context of massive access, the grant-based random access

protocol has the following shortcomings. First, the number

of orthogonal preamble sequences is finite due to the short

coherence time. If there exist a massive number of IoT

devices, the probability that a preamble is selected by more

than one device is high. In other words, the devices suffer

from a high probability of access failure due to collision.

As a consequence, the average access latency may become

too high to be tolerable. Second, the grant-based random

access protocol requires four transmissions, resulting in a high

signaling overhead. Since the channel capacity is limited, the

required signaling overhead might be prohibitively large for

massive access.

B. Grant-Free Random Access

To overcome the problems of grant-based random access,

various grant-free random access protocols have been pro-

posed which allow the active devices to access the wireless

network without a grant [63]. To be specific, active devices

first send their unique preambles to the BTS and then transmit

the data signals directly [64]. Therefore, both access latency

and signaling overhead are significantly reduced. The key idea

of grant-free random access is to detect the active devices

based on the received preambles at the BTS [65]. For massive

access, due to the massive number of devices and the use

of short packets, the preamble sequences are not orthogonal.

As a result, the received preamble signals suffer from severe

co-channel interference. Hence, the BTS has to adopt sophis-

ticated activity detection algorithms. In other words, grant-

free random access reduces the access delay and the signaling

overhead at the expense of a high computational complexity

at the BTS. In general, grant-free random access for massive

access requires massive device detection at the receiver. This

can be done using a compressed sensing (CS)-based sparse

signal recovery framework or a covariance-based approach for

massive device detection as discussed below.

1) CS Formulation: Due to the sporadic traffic generated

by IoT applications, the received preamble signal is typically

sparse when only the active devices send their preambles. It is

well known that the resulting sparse signal recovery problem

from noisy measurements can be tackled with CS methods

[66], [67]. The CS problem for massive device detection can

be formulated as

minimizeX

‖X‖0

s.t. ‖Y −AX‖F ≤ δ, (7)

where ‖·‖0 is the zero-norm defined as the number of nonzero

elements of the argument and ‖ · ‖F is the Frobenius norm. In

the above CS problem, Y is the space-time received preamble

signal and δ is a predetermined error tolerance constant which

depends on the noise power. Moreover, A = [a1, · · · , aK ] is

the sensing matrix with ak being the kth device’s preamble

sequence, and X = [α1h1, · · · , αKhK ]T is the device state

matrix with αi and hi being the activity indicator and the

channel response of the ith device, respectively. Here, αi = 1if the ith device is active, otherwise αi = 0. Hence, multiple

rows of X are zero and the aim of the CS problem (7) is to

determine the nonzero rows of X from the noisy measurements

Y, i.e., activity detection. The CS problem (7) is generally

nonconvex and thus it is difficult to obtain the globally optimal

solution directly and efficiently. Therefore, massive device

detection algorithms are usually designed based on a relaxed

CS problem. In what follows, we discuss different aspects of

the design of CS-based massive device detection algorithms.

[a] Sensing Matrix Design: The sensing matrix A has a

significant impact on the design of massive device detection

algorithms and hence determines the performance of grant-

free random access, namely the detection probability. Since

the preamble sequences are nonorthogonal, the design of the

sensing matrix is not a trivial task. In 4G LTE systems,

Zadoff-Chu (ZC) sequences are adopted as preamble signals

because of their good auto- and cross-correlation properties.

ZC sequences were used as preamble sequences for grant-

free random access systems in [68] and their performance

Page 8: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

8

TABLE IVPREAMBLE SEQUENCES FOR MASSIVE DEVICE DETECTION.

Reference Preamble Sequence Advantage

J. Ding et al. [68] ZC sequences Good auto- and cross-correlation properties

L. Liu et al. [69] Gaussian sequences Easy to generate and convenient for performance analysis

J. Wang et al. [71] RM sequences Reduced storage space requirements

S. Li et al. [72] Deep auto-encoded sequences Adaptive to sparse patterns even without analytical models

was compared to that of orthogonal sequences. Recently, inde-

pendent and identically distributed (i.i.d.) Gaussian sequences

have been considered as preamble sequences to study grant-

free random access. This is because Gaussian sequences can be

easily generated and are convenient for performance analysis.

For instance, the detection probability for Gaussian distributed

preamble sequences was derived in [67] and [69]. It was shown

that the detection probability improved as the number of BTS

antennas was increased. Theoretically, the active devices can

be detected perfectly in the asymptotic limit as the number

of BTS antennas goes to infinity. Furthermore, the impact

of the length of Gaussian distributed preamble sequences on

the detection probability was analyzed in [70]. Then, the

durations of the preamble and data sequences in a frame were

optimized to maximize the system spectral efficiency. Since

each device is assigned a unique preamble sequence, the BTS

has to allocate a large amount of storage capacity to store

the preamble sequences in the massive access case. In order

to reduce the required storage space, Reed-Muller (RM) se-

quences can be applied as preamble sequences. The authors in

[71] exploited the nested structure of RM sequences and their

sub-sequences to design a low-complexity activity detection

algorithm. Moreover, a data-driven deep learning method was

applied to generate preamble sequences, which can adapt to

wireless channels with arbitrary distribution. In [72], a deep

auto-encoder was utilized to jointly design preamble sequences

and the corresponding sparse signal recovery algorithm, which

can effectively exploit sparsity patterns even without analytical

models. Several potential preamble sequences for massive

device detection are compared in Table IV.

[b] CS Algorithms: Since the zero-norm in the objective

function of the CS optimization problem (7) is nonconvex, it

is impossible to design massive device detection algorithms by

solving the original problem optimally with polynomial time

computational complexity [73]. In the literature, optimization

algorithms, greedy algorithms, and Bayesian approaches have

been utilized to obtain effective suboptimal solutions for the

above CS optimization problem in the context of massive

device detection. These algorithms are explained in the fol-

lowing.

[b.1] Optimization Algorithms: In order to obtain a feasible

solution of the CS problem (7), it is necessary to approximate

the objective function. In [74], the zero-norm ‖X‖0 was

replaced by the sum of all entries of X. Thus, the original

problem was transformed to a linear programming problem

which can be solved optimally with low complexity. The

solution of the linear programming problem can be proved

to be identical to that of the original problem only when

X is sufficiently sparse and there is no noise. On the other

hand, since the l1-norm is convex, many papers base the

algorithm design on l1-regularization problems. For example,

the authors in [75] proved that if X is sufficiently sparse,

l1-regularization problems can accurately recover X even

for noisy measurements. Furthermore, the authors in [76]

transformed the original CS problem to an l1-regularization

least-squares problem and proposed a customized interior-

point method for solving the problem.

For massive access in B5G wireless networks, the num-

ber of IoT devices and the number of BTS antennas are

expected to be very large, resulting in a high dimensional

device state matrix X. Hence, even with l1-regularization,

the computational complexity may still be prohibitive. In

fact, due to the spatial correlation of the BTS antennas, X

may not only be sparse, but also low-rank. The simultaneous

sparsity and low-rank property can be exploited to further

decrease the computational complexity of activity detection.

In [77], a rank or nuclear norm constraint was inserted into

the l1-regularization problem. Theoretical analysis revealed

that such a nuclear norm constrained problem can achieve

near-optimality based on a small number of measurements.

To further decrease the computational complexity and the

required length of the preamble sequences, a rank-aware l1-

regularization least-squares problem was formulated by esti-

mating the rank of X in advance [78]. For a given rank, the l1-

regularization least-squares problem can be transformed into

a low-dimensional problem. Yet, the rank-aware problem is

usually nonconvex. To tackle this challenge, a Riemannian

optimization-based algorithm was proposed in [78] to obtain

a suboptimal solution.

Moreover, lp-norm minimization with 0 < p < 1 can be

used to develop optimization algorithms for massive device

detection [73]. Since the lp-norm is a better approximation

for the l0-norm than the l1-norm, lp-norm minimization may

achieve more accurate activity detection. However, due to the

nonconvexity of the lp-norm, lp-norm minimization usually

leads to a high computational complexity.

[b.2] Greedy Algorithms: To avoid having to solve non-

convex CS problems via non-polynomial time algorithms,

greedy algorithms can be applied to massive device detection

in an effort to reduce the computational complexity at the

expense of a degradation in performance. Greedy algorithms

are iterative approaches that take local optimal decisions in

each step to eventually obtain an effective suboptimal solution.

One of the most widely used greedy algorithms in device

detection is the group orthogonal matching pursuit (GOMP)

algorithm [79]. Since the device state matrix X in general

contains only a few nonzero rows, in the absence of noise,

the measurements are in a space supported by a sub-matrix

of A determined by the positions of these nonzero rows. The

GOMP iteratively builds the support of X and enhances the

Page 9: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

9

device detection performance by accumulating the correlation

between the residual and the sensing matrix. Although the

GOMP detection algorithm based on correlation is simple,

its performance is heavily affected by noise. Another type of

greedy algorithm, namely the Hierarchical Hard Thresholding

Pursuit (HiHTP) algorithm [80], [81], makes use of not only

the block structure of the device state matrix, but also the

intra-block sparse structure caused by the channel taps. The

sporadic device activity and the sparse channel profiles give

rise to a hierarchically sparse structured vector containing all

estimated channel coefficients. Motivated by this observation,

a prediction of the support of the device state matrix can

be inferred by applying a thresholding operation based on

the hierarchically sparse structure. Then, the best l2-norm

approximation to the received signal compatible with this

support is calculated. The HiHTP algorithm can efficiently

reconstruct hierarchically sparse signals from only a small

number of linear measurements.

One important property of greedy detection algorithms is

their simplicity of implementation. However, a drawback is

their inherent error propagation, since previous choices for

device activity are not re-evaluated. Moreover, the detection

performance of these algorithms is seriously affected by the

noise level.

[b.3] Bayesian Approaches: To improve the detection per-

formance of massive random access, Bayesian CS-based de-

tection algorithms have been developed, e.g. [82]-[85]. This

kind of detection algorithm first assigns a prior probability

distribution which promotes sparsity to the unknown device

state matrix, and then infers the posterior distribution of the

unknown signal from the received signal at the BTS. By

exploiting the prior channel information regarding the path loss

and the chunk sparsity structure, the authors in [82] proposed

a Bayesian CS-based algorithm to efficiently detect device

activity in an uplink cloud radio access network. However,

the Bayesian formulation in [82] was developed based on the

assumption of infinite-capacity fronthaul links, which is not

practical. Thus, taking into account the impact of fronthaul

capacity limitations, the authors in [83] employed a hybrid

generalized approximate message passing (GAMP) method,

which was based on a quadratic approximation of the sum-

product message passing scheme and accommodated both

nonlinear measurements and group sparsity to enhance the

device detection performance.

To further exploit statistical channel knowledge, the authors

in [67] adopted a Bayesian approach where the sparsity was

modeled via the prior distribution of the channel to facilitate

the development of an improved version of the approximate

message passing (AMP) algorithm. The authors in [69] further

demonstrated that in an asymptotic regime where the number

of users, the pilot length and the number of BTS antennas all

go to infinity in a particular manner, both the miss detection

and the false alarm probabilities of the AMP algorithm for

activity detection can asymptotically approach zero. The exact

knowledge of the prior distribution of the channels and the

noise variance may be difficult to obtain in practice due to

the sporadic traffic and the spatial correlation of the channels.

Furthermore, the above works considered massive device

detection in narrowband scenarios. In fact, B5G wireless

networks might employ broadband systems, e.g., millimeter

wave (mmW) or even terahertz (THz) systems [84]. Towards

this end, the authors in [85] proposed a generalized multiple

measurement vector approximate message passing (GMMV-

AMP) algorithm to adaptively detect the active devices by

exploiting the virtual angular domain sparsity of the channels

in an orthogonal frequency division multiplexing (OFDM)

broadband system. Furthermore, the expectation maximization

(EM) algorithm was utilized to learn the unknown hyper-

parameters of the channel and noise distributions. Several

massive device detection algorithms are compared in Table

V.

[c] Joint Device Detection and Channel Estimation: To

realize effective massive access, the BTS requires accurate

CSI for decoding the uplink signals and performing precoding

of the downlink signals after activity detection. In general,

CSI is acquired through channel estimation at the BTS based

on pilot sequences sent by the devices. Since the preamble

sequences for activity detection can be also exploited as

pilot sequences for channel estimation, activity detection and

channel estimation can be jointly performed based on the same

sequences.

Recently, several joint activity detection and channel estima-

tion (JADCE) algorithms for massive connectivity in cellular

IoT networks have been reported. Since JADCE is still a CS

problem, the authors in [86] proposed a Lasso-based l2,1-

regularization penalty function to exploit the inherent sparsity

existing in both the device activity and the remote radio

heads with which the active devices are associated. Then, an

alternating direction method of multipliers (ADMM) algorithm

was applied to handle the resulting large-scale convex JADCE

problem. In fact, Bayesian algorithms can be also adopted to

handle the JADCE problem. In [87], by exploiting statistical

information about the wireless channels, a JADCE algorithm

was designed for massive MIMO systems to jointly detect

device activity and estimate the CSI. Furthermore, an expec-

tation propagation (EP)-based JADCE algorithm was proposed

in [88] for massive access. This algorithm approximated

the computationally intractable probability distribution of the

sparse channel vector by an easily tractable distribution, which

can substantially enhance JADCE performance.

A major problem of the above JADCE algorithms is that

in practical scenarios with short pilot sequences, their per-

formance is severely degraded. To tackle this problem, the

authors in [89] proposed a transmission control scheme for

grant-free random access protocols. Specifically, based on

a predetermined transmission control function, each active

device decides to transmit a packet in the current time slot

or to postpone the transmission. At the BTS, a modified

AMP algorithm was adopted to improve JADCE performance.

Transmission control was motivated by the fact that decreasing

the number of active devices can significantly improve JADCE

performance for a given pilot length.

[d] Joint Device and Data Detection: To reduce access

latency and signaling overhead, blind detection has become

a promising approach to jointly detecting devices and data for

massive access scenarios without prior knowledge of the CSI,

Page 10: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

10

TABLE VMASSIVE DEVICE DETECTION ALGORITHMS.

Reference Algorithm Type Description

M. Golbabaee et al. [77] Optimization algorithm Rank-constrained l1-regularization optimization algorithm

X. Shao et al. [78] Optimization algorithm Rank-aware Riemannian optimization algorithm

C. Bockelmann et al. [79] Greedy algorithm Group orthogonal matching pursuit algorithm

I. Roth et al. [80] Greedy algorithm Hierarchical hard thresholding pursuit algorithm

Z. Chen et al. [67] Bayesian algorithm Approximate message passing algorithm

M. Ke et al. [85] Bayesian algorithm Generalized multiple measurement vector approximate message passing algorithm

especially for low-latency communications. For instance, the

authors in [66] proposed a non-coherent transmission scheme

that does not need CSI at the BTS and developed a modified

AMP algorithm to exploit the structured sparsity caused by

the scheme. For this algorithm, explicit channel estimation is

not required because of the non-coherent transmission, and the

data signal is embedded into the pilot sequences. Motivated

by the observation that if the active devices transmit symbols

that are either −1 or 1 and the inactive devices are modelled

as transmitting all-zero symbols, the transmit symbol alpha-

bet is ternary, the authors in [90] proposed an information-

enhanced adaptive matching pursuit algorithm for joint device

and data detection. Moreover, the authors in [91] proposed

a maximum a posteriori probability (MAP)-based device and

data detection algorithm, which comprises a MAP-based active

user detector (MAP-AUD) and a MAP-based data detector

(MAP-DD). Extrinsic information is exchanged between the

MAP-AUD and the MAP-DD. In particular, joint detection

of the active devices and the data symbols is performed first,

then the estimated data symbol is refined and used as a priori

information for the detection of the active devices.

The above algorithms carry out joint device and data

detection within one time slot. In other words, they do not

exploit the temporal correlation across time slots. To this

end, a dynamic CS-based device and data detector using

orthogonal matching pursuit (OMP) across time slots was

proposed in [92]. Moreover, an a priori information aided

adaptive subspace pursuit (PIA-ASP) algorithm was proposed

in [93] to detect active devices and data symbols. In the PIA-

ASP algorithm, a parameter evaluating the quality of the prior-

information support set was introduced, so as to exploit the

intrinsic temporal correlation of the active device support sets

across several continuous time slots.

2) Covariance Formulation: If we are only interested in

detecting the device activities and not interested in estimating

the channel and if the BTS is equipped with a large number

of antennas, it is possible to formulate the massive device

detection as a maximum likelihood estimation problem based

on the covariance matrix of the received signal at the BTS,

and then employ a coordinate descent method to obtain a

suboptimal solution [94], [95]. The key advantage of this

covariance-based approach is that it is able to detect a much

larger number of active devices. In fact, the number of active

devices can scale quadratically with the length of the pilot

sequences, thereby alleviating a key bottleneck in massive

access. This scaling law was established under a so-called non-

negative least square (NNLS) formulation in [95], and can also

be analyzed via the Fisher information matrix of the maximum

likelihood problem [96]. We note that the covariance-based

approach can also be used for joint activity and data detection.

Specifically, each device is assigned not only one sequence but

a unique sequence set. The transmitted sequence corresponds

to the transmitted data. Hence, by detecting the received

sequence, the activity information and the data information

can be obtained simultaneously.

Generally speaking, massive device detection for grant-

free random access is still an open problem, which involves

two challenging unsolved issues. First, the existing algorithms

entail a high computational complexity for recovering the

device state matrix due to its large-dimensional structure.

Second, the required length of the preamble sequences may

be too long for short-packet transmission in B5G wireless

networks.

C. Unsourced Random Access

Recently, a new massive random access paradigm, referred

to as unsourced massive random access, was proposed in

[61]. Unlike grant-based and grant-free random access pro-

tocols that assign each device a unique preamble sequence,

unsourced massive random access utilizes one codebook (a

set of sequences) for all devices. The devices include their

identity (ID) in the information message itself, and the BTS

decodes the list of active device messages up to permutations.

It has been shown that unsourced massive random access can

significantly decrease the minimum energy per bit required

for reliable communication. The authors in [97] extended

unsourced massive random access to the case where the BTS

had a very large number of antennas and no CSI. Specifically,

the minimum energy required for reliable communication can

be made arbitrarily small as the number of BTS antennas

grows sufficiently large. However, there are many challenging

unsolved problems in unsourced massive random access, such

as efficient codebook design and activity detection algorithms.

Some recent progress on codebook design for massive access

has been reported in [98].

V. MASSIVE ACCESS TECHNIQUES

Access techniques organize the data exchange between the

active devices and the BTS. In previous generations of cellular

networks, OMA techniques, such as TDMA, FDMA, and

OFDMA, have been adopted. For 5G NB-IoT, SC-FDMA is

employed for the uplink and OFDMA for the downlink. In par-

ticular, OMA techniques allocate each time-frequency resource

block to a unique device which leads to a simple transceiver

structure. However, due to the limited radio spectrum available

for cellular communications, it is difficult to support massive

Page 11: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

11

access with the conventional OMA techniques. To tackle this

challenge, there are two possible directions for massive access

in B5G wireless networks. On the one hand, new wireless

resources, e.g., new spectrum, can be utilized to admit more

devices. On the other hand, resource utilization efficiency

can be further improved to support massive access. In the

following, we describe two different massive access techniques

which are along the above-mentioned directions.

A. Massive Orthogonal Access

Conventional OMA techniques over limited radio spectrum

cannot satisfy the stringent QoS requirements of massive

access, and hence B5G wireless networks have to adopt

new massive orthogonal access techniques by exploiting extra

degrees of freedom. Due to the strict latency constraints, time-

domain resources are scarce and cannot be used for massive

access. Instead, exploiting additional space- and frequency-

domain resources is more attractive.

1) Massive MIMO: Multiple-antenna techniques have been

adopted in 4G long-term evolution (LTE) networks to increase

transmission rate and to enhance link reliability by exploiting

extra spatial degrees of freedom. However, the BTSs of 4G

LTE can be equipped only with up to eight antennas. Thus, the

spatial degrees of freedom offered by LTE multiple-antenna

BTSs are limited and far from enough to facilitate massive

access. To significantly increase the available spatial degrees

of freedom, the BTSs of B5G wireless networks will deploy a

large-scale antenna array with 64 or more antennas, realizing

massive MIMO. Therefore, a large number of devices can

access the network simultaneously and the BTS can separate

them in the spatial domain, e.g. space division multiple access

(SDMA) [99], [100].

The pioneering work on massive MIMO in [101] showed

that co-channel interference vanishes asymptotically even with

simple linear precoders and combiners as the number of BTS

antennas tends to infinity due to channel hardening. Moreover,

it was shown that both the spectral and energy efficiencies

can be improved significantly by using massive MIMO [102],

[103]. In the case of massive access, massive MIMO does

not only increase the accuracy of active device detection but

also improves the transmission performance [87]. However,

there are two critical issues for implementing massive access

in massive MIMO systems.

The first issue concerns the CSI acquisition at the BTS. The

accuracy of the CSI at the BTS determines the performance

of massive access based on massive MIMO [104]. Since the

BTS is at the transmitter side for the downlink, it is impossible

to obtain CSI directly. In traditional multiple-antenna systems,

there are two CSI acquisition methods. In frequency division

duplex (FDD) systems, the devices first obtain the CSI by

channel estimation and then feed back the quantized CSI to

the BTS [105]. For massive access based on massive MIMO,

the required number of feedback bits at each device is large

due to the high dimensional channel vector. Thus, the total

amount of feedback required for a large number of devices

can be prohibitive. In other words, conventional quantized

feedback methods are not applicable for massive access based

on massive MIMO. However, if the channel is sparse, several

effective methods, e.g. CS [106], [107], can reduce the amount

of feedback. In [108], the received pilot signal of each device

was conveyed to the BTS and the sparse CSI of all devices

was jointly recovered by using a l1-regularization-based CS

method. Moreover, deep learning was employed to compress

the sparse CSI in [109], such that the amount of feedback

became affordable. The requirement of sparse CSI limits the

applicability of the above methods to FDD systems. Hence,

massive MIMO is usually envisioned to operate in the time

division duplex (TDD) mode. In TDD systems, the devices

send pilot sequences to the BTS in the uplink and the BTS

obtains the downlink CSI by estimating the uplink channels

exploiting channel reciprocity [110]. An obstacle to realiz-

ing CSI acquisition in TDD systems is the so-called pilot

contamination problem [111]. Specifically, due to the limited

pilot sequence length available for serving a massive number

of devices, the same pilot sequences have to be reused in

different devices. Consequently, the CSI estimation accuracy

is reduced due to co-channel interference. Because the pilot

sequences in massive access cannot be completely orthogonal,

it is necessary to improve the CSI accuracy. To this end, in

[112], a pilot transmit power control scheme was proposed, so

as to improve the overall performance. Since the CSI accuracy

depends on the pilot transmit energy, for a given transmit

power, the pilot sequence length should be optimized as in

[70].

The second issue concerns the energy consumption and

the associated cost. The use of massive MIMO for massive

access requires a large number of radio-frequency (RF) chains

and the associated analog-to-digital converter (ADC) modules.

If each antenna is equipped with a dedicated RF chain, the

number of RF chains can be very large resulting in high energy

consumption [113]. To decrease the number of RF chains

but retain the benefits of massive MIMO, hybrid precoding

techniques are needed to allow multiple antennas to share

the same RF chains [114]–[116]. Compared to conventional

digital precoding schemes, hybrid precoding incurs high de-

sign complexity but low implementation cost. In [117], a

penalty dual decomposition-based hybrid precoding design

method was proposed, which is guaranteed to converge to a

Karush-Kuhn-Tucker (KKT) solution of the hybrid precoding

problem under some mild assumptions. To decrease the design

complexity, a two-timescale hybrid precoding method was

presented in [118], which constructed the analog beamforming

based on slowly time-varying statistical CSI. Moreover, the

high cost of ADC is a vital issue for massive MIMO. Since

the ADC cost is mainly determined by the resolution of the

quantization, a low-resolution ADC is preferred for massive

access based on massive MIMO at the cost of a performance

loss [119], [120]. In [121], the impact of low-resolution ADC

on the performance of massive access was analyzed, and a time

allocation scheme for channel estimation and data transmission

was proposed to alleviate the impact of low-resolution ADC.

2) Millimeter-Wave/Terahertz: According to the Shannon

capacity theorem, increasing the bandwidth is a simple but

effective way for improving the capacity of wireless com-

munications. Current cellular networks operate in sub-6 GHz

Page 12: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

12

bands which provide limited bandwidth and are overcrowded.

On the contrary, high frequency bands have large vacant

spectra. Hence, for B5G wireless networks, the use of mmW

and even THz bands is attractive in order to realize massive

access in the frequency domain [122]-[124]. A critical issue

for mmW/THz communications is the severe propagation

loss, resulting in a short transmission distance. To address

this problem, mmW/THz is usually combined with massive

MIMO or even ultra-massive MIMO employing more than one

thousand antennas [125]. Thus, CSI acquisition and precoding

become more complicated for mmW/THz communications.

Fortunately, mmW/THz channels have two important charac-

teristics. Firstly, the mmW/THz channel is very sparse, such

that CS and Bayesian methods can be used to acquire the CSI

required for the design of the precoding matrix. In [126], to

obtain CSI, the l1,2-regularization-based CS method was ap-

plied, which can avoid quantization errors and provide super-

resolution performance. By modeling the channel coefficients

as Laplacian distributed random variables, a GAMP algorithm

was used to find the entries of the unknown mmWave MIMO

channel matrix in [127]. Secondly, mmW/THz channels usu-

ally exhibit high-resolution angular-domain characteristics.

Accordingly, beam tracking methods can be used to extract

the CSI. In [128], a beam selection scheme was presented to

decrease the complexity of beam tracking. Moreover, beam

alignment was applied to improve the performance of beam

tracking in [129].

B. Massive Non-orthogonal Access

A promising approach for increasing the number of sup-

ported access devices over a limited radio spectrum is the

use of non-orthogonal multiple access (NOMA) techniques,

which allow multiple devices to share the same time-frequency

resource block. Hence, NOMA is a candidate technique

for B5G wireless networks [130]-[133]. Compared to OMA

techniques, NOMA techniques have the potential to improve

spectral efficiency. In other words, for a given required spectral

efficiency per device and a given bandwidth, NOMA can

admit significantly more devices than OMA. Thereby, NOMA

is able to support massive access in a limited radio spec-

trum. However, NOMA techniques lead to severe co-channel

interference, especially in the massive access scenario. The

key to realizing massive NOMA is interference management

[134]. So far, academia and industry have proposed several

NOMA schemes, which can be classified into two categories,

namely power-domain non-NOMA (PD-NOMA) and code-

domain NOMA (CD-NOMA).

1) Power-Domain Non-Orthogonal Multiple Access: PD-

NOMA shares the radio spectrum through superposition cod-

ing with the transmit powers as weight factors [135]. In this

case, the access devices can be separated in the power domain.

In order to decrease the co-channel interference caused by non-

orthogonal transmission, successive interference cancelation

(SIC) is usually carried out at the receiver. Specifically, the

receiver first decodes the interfering signal with the highest

transmit power and removes it from the received signal. Then,

it decodes the interfering signal with the next highest transmit

power until the desired signal is recovered. Hence, power

allocation has a great impact on the performance of PD-

NOMA. Intuitively, a device with a small channel gain is

allocated a high transmit power, so as to guarantee fairness.

Yet, it is not a trivial task to perform optimal power allocation

in PD-NOMA, since there is residual inter-user interference

from the devices with lower transmit powers. In [136], a

cognitive power allocation scheme was proposed for two-user

PD-NOMA. Since SIC only cancels the partial co-channel

interference caused by the devices with higher transmit pow-

ers, devices with small channel gains may still suffer from

strong co-channel interference after SIC, resulting in poor

performance. In order to guarantee fairness, the authors in

[137] proposed a power allocation scheme that maximizes the

rate of the device with the smallest channel gain.

PD-NOMA improves spectral efficiency at the cost of high

computational complexity due to the use of a SIC receiver

for interference mitigation. The computational complexity

increases as the number of devices increases. In the scenario of

massive access, the computational complexity and the signal

processing delay might be prohibitive if SIC is performed for

all devices. A possible solution to overcome these challenges

is to perform device clustering [138], [139]. Thereby, the

devices are grouped into several clusters, where each cluster

contains a small number of devices. SIC is performed within

each clusters, which reduces the computational complexity

effectively. In [140], a frequency-domain clustering scheme

was proposed, where two devices assigned to the same sub-

carrier of an OFDMA system form a cluster. Frequency-

domain clustering guarantees orthogonality across clusters,

but decreases the spectral efficiency. Considering that the

BTSs of B5G wireless networks will be equipped with a

large-scale antenna array, it may be preferable to perform

device clustering in the spatial domain, where each cluster

can occupy the entire spectrum [141]. Since spatial device

clustering incurs extra inter-cluster interference, spatial beam-

forming combined with power allocation has to be employed to

combat the interference [142]. To further unleash the potential

of non-orthogonal signaling, a fully non-orthogonal access

scheme was designed for massive access in [143], where non-

orthogonal pilot sequences were used to estimate the CSI with

small overhead, and the estimated CSI was applied for the

design of spatial beamforming for interference cancellation.

As mentioned earlier, most IoT devices are simple nodes

with limited computational capability. As a result, IoT devices

may perform SIC imperfectly, resulting in severe residual

intra-cluster interference. In this context, the authors in [144]

proposed a spatial beamforming scheme for massive access

taking imperfect SIC into consideration. In fact, the design

of a large number of spatial beams canceling inter-cluster

interference also entails high complexity in the massive access

scenario. In order to reduce the computational complexity

of beam design, a beamspace non-orthogonal multiple access

scheme was proposed in [145], which constructed the transmit

beams based on statistical CSI. Compared to the beamforming

schemes based on instantaneous CSI, the one based on statis-

tical CSI leads to a complexity reduction at the cost of a loss

in performance.

Page 13: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

13

TABLE VIMASSIVE NON-ORTHOGONAL ACCESS SCHEMES.

Reference Type Characteristics

X. Chen et al. [143] PD-NOMA Superposition coding at the transmitter and SIC at the receiver

Y. Du et al. [147] LDS-CDMA Spreading of the transmitted symbols in the time domain by a low-density code and MAP at the receiver

R. Razavi et al. [148] LDS-OFDM Spreading of the transmitted symbols in the frequency domain by a low-density code and MAP at the receiver

Z. Yuan et al. [149] MUSA Spreading of the transmitted symbols by a code selected from a set of multiple sparse codes and MAP at the receiver

F. Wei et al. [152] SCMA Mapping of the transmitted symbols into a codeword of a codebook consisting of multiple sparse codes and AMP at the receiver

2) Code-Domain Non-Orthogonal Multiple Access: CD-

NOMA assigns different codes to devices for multiplexing

[146]. Different from conventional CDMA, the assigned codes

are sparse. However, the sparse codes can still offer spread-

ing gains for suppressing undesired co-channel interference.

Hence, only a simple message passing algorithm (MPA) at the

receivers is needed to detect the sparse CD-NOMA sequences.

Low-density signature CDMA (LDS-CDMA) [147] and low-

density spreading OFDM (LDS-OFDM) [148] are two direct

extensions of CD-NOMA. In particular, in LDS-CDMA, the

symbol to be transmitted is spread in the time domain, while

in LDS-OFDM, the chips are transmitted in the frequency

domain. LDS-CDMA and LDS-OFDM can be selected based

on the massive access system requirements.

In practice, LDS-CDMA and LDS-OFDM spread the signal

using a predetermined sparse code for each device. In fact,

if the device has multiple spreading codes, it is possible to

further improve the performance of massive access. Inspired

by this idea, multi-user shared access (MUSA) was proposed.

For MUSA, there is a set of spreading codes [149]. Each

device randomly selects a spreading code for each symbol, and

thus in fading channels, the average interference is suppressed

due to the use of different spreading codes at the cost of a

high-complexity receiver.

Unlike the above CD-NOMA schemes, sparse code multiple

access (SCMA) maps the symbol to a sparse code [150].

Each device has a predetermined codebook containing multiple

sparse codes, where the nonzero elements are in the same

positions. The symbol to be transmitted is mapped to an

index, and the corresponding sparse code in the codebook is

selected for transmission. The codebook design for SCMA

was discussed in [151] to further improve the performance

of SCMA. Considering the requirements of massive access,

an SCMA scheme with joint channel estimation and data

decoding was proposed in [152].

A comparison of different massive non-orthogonal access

schemes is provided in Table VI. In summary, both PD-NOMA

and CD-NOMA exploit new degrees of freedom for channel

sharing so as to support massive access over limited wireless

resources. However, both massive access techniques require

sophisticated transceivers to combat co-channel interference.

Considering that the channel matrices in massive access are

high dimensional due to the deployment of the large-scale

antenna arrays at the BTSs, the computational complexity

at the transceivers may be prohibitive. Therefore, the design

of simple but effective transceivers is an important topic for

future research.

CPU

AP

Fig. 6. A cell-free massive MIMO system, where multiple access pointsdistributed over the whole area connect to a central processing unit throughhigh-capacity optical fibre links. Thus, the access distances are shortenedsignificantly.

VI. MASSIVE COVERAGE ENHANCEMENT

IoT has found various applications in industry, agriculture,

traffic, medicine, etc. Hence, IoT devices are distributed over

a very large range, not only in urban areas, but also in rural

areas. To decrease the power consumption and achieve long

battery usage periods, e.g. 20 years, the transmit power of

IoT devices is typically smaller than 23 dBm. Therefore,

the signal received from cell-edge devices is usually very

weak, such that it is difficult to satisfy the QoS requirements.

Consequently, the coverage of current cellular IoT is limited.

Especially, signals received from indoor wireless devices are

usually weak, but there is a large number of such devices.

As a result, indoor massive access is a critical issue. 5G NB-

IoT adopts several coverage enhancement schemes, e.g., low-

order modulation and retransmission, to improve the quality

of signals originating from the cell-edge and indoors. These

schemes enhance the coverage at the cost of a low resource

utilization efficiency. Yet, for massive access, there is no extra

resource that can be used for coverage enhancement. More-

over, current cellular networks only cover densely populated

areas, but IoT has been applied also in rural areas. Deploying

new cellular networks in rural areas is inefficient in terms of

capital cost. Therefore, it is necessary to develop new coverage

enhancement strategies for massive access in B5G wireless

networks. In the following, we discuss three possible coverage

enhancement strategies.

A. Cell-Free Massive MIMO

Massive MIMO has been proved to be an effective approach

to enhance the coverage by exploiting its large array gain

Page 14: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

14

Fig. 7. Indoor coverage enhancement with an intelligent reflecting surface,where the intelligent reflecting surface comprising a large number of reflectingunits generates a favorable propagation environment via beamforming and iscontrolled by a microcontroller.

[153]. Recently, it has been shown that cell-free massive

MIMO can further improve coverage performance. Cell-free

massive MIMO is indeed a distributed antenna system, which

comprises a large number of access points (AP) connected to

a central processing unit (CPU) [154], [155], as shown in Fig.

6. Each AP can deploy one or multiple antennas. The system

is not partitioned into cells and each user is served by one or

multiple APs. Compared to co-located massive MIMO, cell-

free massive MIMO significantly shortens the access distance,

and thus broadens the coverage area. Since the APs form a

large-scale antenna array, the same high spectral efficiency

as with conventional massive MIMO can be achieved. In

[156], it was proved that under uncorrelated shadow fading

conditions, cell-free massive MIMO provides a nearly five-

fold improvement in the 95%-likely per-user throughput over

a small-cell architecture, which is an enhancement strategy for

4G LTE [157], and a ten-fold improvement under correlated

shadow fading conditions. Thus, cell-free massive MIMO is

a promising choice for outdoor coverage enhancement at low

power.

In practice, the APs equipped with independent RF chains

are connected to the CPU by high-capacity optical fibres. Since

the devices are randomly distributed over the service area,

each AP has a different impact on the overall performance.

Hence, it is necessary to wisely allocate the wireless resources

to the APs to achieve the optimal system performance. A

max-min power control scheme was proposed in [158] to

provide equal throughput for all users. It was found that most

APs transmitted at less than the maximum possible power.

Moreover, to improve the utilization efficiency of the low-

resolution ADCs in cell-free massive MIMO, a quantization

bit allocation scheme was proposed in [159].

B. Intelligent Reflecting Surface

The deployment of IoT devices located indoors is expected

to increase significantly in the coming decade [160]. For

indoor applications, in general, the received signal is weak

due to the attenuation caused by walls [161]. Hence, indoor

coverage enhancement is crucial for realizing massive access

in indoor scenarios. Considering the difficult propagation

environment, indoor coverage enhancement is not a trivial

task. A possible solution to this problem is to control the

reflection characteristics of walls to establish favorable signal

propagation environments. The concept of an intelligent wall

as an autonomous part of a smart indoor environment was

proposed in [161]. In particular, an intelligent wall is a wall

equipped with an active frequency-selective surface, simple

low-cost sensors, and a cognitive engine, which can control

the radio coverage to improve the overall system performance.

A simple but effective way to realize such a wall is the

deployment of a reconfigurable reflect-array, also referred to

as an intelligent reflecting surface (IRS), with a large number

of reflecting units that reflect the transmitted signals [162], as

shown in Fig. 7.

By optimally controlling the phase shift of each unit of

the IRS, the desired signal can be enhanced while undesired

interference can be canceled [163], [164]. Since the IRS

comprises a large number of reflecting units, it can play

the same role as a large-scale antenna array through spatial

beamforming. As a result, even for a large number of indoor

wireless devices, the quality of the received signals can be

significantly improved. However, compared to the large-scale

antenna array, the IRS entails lower cost and complexity.

This is because the large IRS does not require power-hungry

RF chains. In other words, IRS is a green massive coverage

enhancement strategy. In [165], the IRS phase shifters were

optimized to maximize the sum rate in a multiuser scenario.

Taking into account that the number of phase shifts for each

reflecting unit is finite in practice, IRS beamforming was

optimized to minimize the total power consumption in [166].

It is worth pointing out that IRS can be utilized to enhance

not only indoor coverage, but also outdoor coverage. Hence,

IRS is regarded as a promising technique for B5G wireless

networks [167]-[169]. Exploiting IRS specifically for massive

access is an interesting topic for future work.

C. Satellite Communications

The rural deployment of IoT is important for monitoring and

management applications [170]. For instance, security cameras

have been installed in forests to predict wildfires [171], and

a large number of sensors have been deployed in the sea to

monitor the ocean resources [172]. Currently, these areas are

not covered by cellular networks. From a cost perspective, it

is prohibitively expensive to deploy new cellular networks in

rural areas. Thereby, satellite communications are expected to

provide wireless access in rural areas [173]. In particular, a

satellite can cover a large area, and thus the cost of wireless

access is substantially decreased. Hence, satellite communi-

cation is expected to become an important component of

B5G wireless networks [174], [175]. By integrating space and

ground networks, seamless coverage can be provided all over

the world.

To shorten the access latency, low earth orbit (LEO) satel-

lites are usually used as access points for space networks

[176]. By applying multiple-beam techniques, a LEO satellite

Page 15: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

15

Fig. 8. Coverage enhancement by a multi-beam LEO satellite, which canprovide low-latency and reliable wireless access to a large number of devicesdistributed in large rural areas by using multiple spatial spot beams.

can serve a large number of devices simultaneously, as shown

in Fig. 8. In [177], the transmit beamforming was designed

for multicast in multiple-beam satellite communications. Con-

sidering imperfect CSI at the satellite, a robust beamfoming

scheme was developed in [178] with the objective of minimiz-

ing the total power consumption. Moreover, cooperative mul-

ticast transmission in integrated space-ground networks was

investigated in [179]. Furthermore, a max-min beamforming

scheme was designed to jointly optimize the beamforming

vectors of the BTS and the satellite. With the fast evolution

of high-throughput multiple-beam satellite communications,

satellite IoT has been proposed in [180], and is expected to

accelerate the creation of an IoE.

Massive access is subject to complex and time-varying

propagation environments. Hence, it is natural to enhance

wireless coverage by combining multiple strategies. For ex-

ample, in hotspot areas, both cell-free massive MIMO and

IRS can be employed to enhance the signal quality. However,

the combination of multiple enhancement strategies entails

high implementation complexity and cost, which have to be

carefully considered for practical deployment.

VII. OTHER MASSIVE ACCESS TOPICS

As outlined in Sections III-VI, massive access in B5G

wireless networks involves many aspects, including theoretical

concepts, protocol design, algorithm development, and cover-

age extension, which have to be jointly considered to improve

the efficiency and reliability of massive access. However, in

order to realize massive access in B5G wireless networks,

there are additional critical issues which have to be considered

such as energy supply and access security. Herein, we provide

a brief discussion of these two topics from the perspective of

massive access.

A. Wireless Energy Transfer

Currently, most IoT devices are battery powered. Since

the battery capacity of IoT devices is quite limited, the

transmit power has to be very low, e.g., 23 dBm. The low

transmit power limits the capabilities of IoT applications.

On the other hand, for higher transmit power, the battery

has to be replaced frequently. The battery replacement for

a massive number of IoT devices entails a high human cost

and a large environmental strain. Moreover, it is difficult to

replace the batteries of devices in extreme environments, e.g.,

in walls and under water. Recently, wireless energy transfer,

namely wireless charging, has received considerable attention

from both academia and industry [184]-[186]. In particular,

wireless energy transfer based on RF signals can provide stable

and reliable energy supply. Hence, IoT devices can realize

sustainable communications even under adverse conditions,

as long as there is wireless coverage. More importantly, due

to the broadcast nature of wireless channels, many devices

can be charged in parallel. Hence, wireless energy transfer

is particularly appealing for cellular IoT with massive access

[187], [188].

A challenging issue in wireless energy transfer is the low

energy transfer efficiency due to path loss and channel fading

during the transmission of the wireless energy signal. As a

result, the effective distance of wireless energy transfer is

too short to achieve the broad coverage desirable for massive

access. To overcome this problem, the concept of energy

beamforming was introduced for wireless energy transfer

[189], [190]. Specifically, by using spatial beamforming, the

energy signal is focused on the receiver, and thus the transfer

efficiency can be improved effectively. It was shown that even

with partial CSI at the transmitter, energy beamforming can

enhance the energy transfer efficiency. Especially in multiuser

scenarios, energy beamforming can facilitate simultaneous en-

ergy harvesting for a massive number of devices. Furthermore,

when the transmitter is equipped with a large-scale antenna

array, the effective transmission distance can be increased sig-

nificantly [191]. By exploiting the very high spatial resolution

of large-scale antenna arrays, it is possible to charge a massive

number of devices with high efficiency. Moreover, multiple-

point cooperation and relaying can be employed to further

increase the transfer distance [192]-[194].

Wireless energy transfer is already being applied for short-

distance charging scenarios. For instance, mobile phones can

be charged without wireline connection. The provision of long-

distance wireless energy transfer for practical massive access

is still an open research problem due to the low transfer

efficiency and requires further research.

B. Physical-Layer Security

In massive access, a massive number of devices share the

radio spectrum. Any device can receive the other devices’

signal, resulting in the risk of information leakage. Tradi-

tionally, access security has been realized by using upper-

layer encryption techniques [195], [196]. Due to the fast

evolution of communication technology, the computational ca-

pabilities of eavesdropping nodes have significantly increased.

Consequently, encryption techniques have to become more

sophisticated to guarantee information security. Yet, most

IoT devices are low-cost nodes with limited computational

capability, and thus they cannot afford the high complexity

required for advanced encryption techniques. Moreover, for

Page 16: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

16

some versions of massive access, e.g., grant-free random

access, conventional encryption techniques relying on secure

key distribution are not applicable. In this context, physical-

layer security techniques, as a complement to conventional

encryption techniques, can be adopted to facilitate secure

massive access [197]. The essence of physical-layer security

is to exploit the inherent random characteristics of wireless

channels, e.g., fading, interference, and noise, to ensure that

the information transmission rate of the desired link is higher

than the eavesdropping channel capacity, and hence, the eaves-

dropper is not able to decode the intercepted signal correctly

[198], [199]. As mentioned earlier, massive access causes

severe co-channel interference, which can be exploited to

improve the security of B5G wireless networks by applying

physical-layer security techniques.

According to the basic principles of physical-layer security,

in order to enhance the secrecy performance, it is necessary

to improve the quality of the legitimate signal and decrease

the quality of the eavesdropping signal simultaneously. Hence,

multiple-antenna techniques are commonly employed to pro-

vide physical-layer security [200]. For instance, if the legiti-

mate signal is transmitted in the null space of the eavesdrop-

ping channel matrix, the eavesdropper cannot receive the le-

gitimate signal. More generally, it is possible to maximize the

secrecy rate through spatial beamforming. Even in challenging

environments with multiple eavesdroppers, spatial beamform-

ing can facilitate access security if there are enough spatial

degrees of freedom at the transmitter [201]. Unfortunately, the

secrecy performance of spatial beamforming heavily depends

on the accuracy of the CSI available at the multiple-antenna

transmitter. In general, the CSI of the eavesdropping channel

is difficult to obtain, since eavesdroppers usually hide their

existence by remaining silent (i.e., passive eavesdroppers).

In this case, artificial noise may be sent in the null space

of the legitimate devices’ channel matrices to confuse the

eavesdroppers [202].

In B5G wireless networks, the BTSs might be equipped with

a large-scale antenna array. By exploiting the very high spatial

resolution of the large-scale antenna array, secure access for a

massive number of devices can be provided. It has been proved

that if the BTS has full CSI, linear precoding can ensure that

the information leakage asymptotically tends to zero [203].

Hence, even without the eavesdroppers’ CSI, it is possible to

realize secure massive access. However, the acquisition of the

legitimate devices’ CSI in massive MIMO systems with a large

number of devices is not trivial [204]. Firstly, pilot sequences

are usually non-orthogonal, resulting in low CSI accuracy.

Secondly, the eavesdroppers can send interfering signals dur-

ing channel estimation to increase the interception probability.

Hence, providing physical-layer security in massive access is

still a challenging issue.

VIII. FUTURE RESEARCH DIRECTIONS

Despite the significant research efforts dedicated to fa-

cilitating massive access in B5G wireless networks, many

challenging issues remain to be tackled. In the following, we

discuss some future research directions.

A. Mobile Access

In cellular IoT, a fraction of the devices is expected to be

mobile and some devices may move with high speed. Mobility

gives rise to additional challenges for massive access. First,

mobility leads to fast time-varying channel fading making the

acquisition of the accurate CSI needed to facilitate massive

access very challenging, resulting in a performance degrada-

tion. Second, mobility causes frequent handoffs. For example,

in Internet-of-Vehicles applications, frequent handoffs between

BTSs may occur. Hence, the priority of mobility handoffs and

new access requests have to be properly handled. Moreover,

mobility may change the channel capacity of massive access

[205]. So far, only a few works have considered mobility in

massive access [206], [207].

B. Modulation and Coding

Modulation and coding schemes (MCS) are key for guaran-

teeing both high efficiency and high reliability for massive

access. The 5G wireless standard utilizes low-density par-

ity check (LDPC) codes and polar codes for the data and

control channels, respectively [16]. For massive access in

B5G wireless networks, some new characteristics have to be

considered. Firstly, the sporadic nature of IoT traffic favors

the use of short packets, and thus, short FEC codes should be

adopted. Secondly, as IoT devices are typically simple nodes

with limited computational capabilities, MCS in B5G wireless

networks have to be low-complexity. Therefore, the design of

new low-complexity short codes for massive access is a key

research problem.

C. Big Data Analytics and Large Dimensional Signal Process-

ing

In B5G wireless networks, there is a massive number of

IoT devices generating a huge volume of data. Meanwhile,

since the BTS is usually equipped with a large-scale antenna

array, the dimension of the received signal is very large.

Hence, massive access inevitably leads to big data in volume

and dimension. This significantly increases the burden on

B5G wireless networks. In order to improve the efficiency

of massive access, it is necessary to develop methods for big

data analytics and large dimensional signal processing. For

instance, a dimension reduction-based algorithm was designed

to decrease the computational complexity of massive active

device detection in B5G wireless networks [208]. However,

there is still a lack of efficient methods for channel estimation,

precoding design, and other aspects of massive access. Devel-

oping such methods is an exciting future research direction.

D. Ultra-Reliable Low-Latency Communication

Ultra-reliable low-latency communication (URLLC) is a

basic requirement in many cellular IoT application scenarios,

e.g. Internet-of-Vehicles [209]. However, it is very challenging

to guarantee URLLC over fading channels. First, massive

access leads to severe co-channel interference, which decreases

the access reliability. Second, short packets are used in cellular

IoT to decrease the latency, but they are also prone to a high

Page 17: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

17

decoding error rate. Hence, achieving URLLC for massive

access is still an open issue.

E. Machine Learning-Based Massive Access

Smart communication is a new trend in wireless communi-

cations. Currently, machine learning, especially deep learning,

is being applied in wireless communications for resource allo-

cation, signal processing, channel estimation, and transceiver

design [210]. It has been shown that machine learning can

decrease the design complexity of wireless communication

networks while achieving high performance. In cellular IoT,

the BTS has to cope with the wireless access of a massive

number of devices, resulting in a high computational complex-

ity. The application of machine learning for massive access is

expected to significantly decrease complexity. Yet, there is a

lack of analytical frameworks for machine learning as applied

in wireless networks, which currently limits its applicability

in practice [211].

F. Convergence of Sensing, Computation, and Communication

Sensing, computation, and communication are three basic

functionalities of B5G wireless networks [212]. Traditionally,

these three functionalities have been carried out independently.

Hence, it is necessary to allocate wireless resources for each

functionality, resulting in a high resource consumption. In

the case of massive access, the resources required to support

these functionalities might be prohibitive. Hence, it is desirable

to jointly design these three functionalities to improve the

efficiency of massive access. For instance, the transmission

of sensed signals over multiple access channels can also

be exploited to perform computations by applying over-the-

air computation techniques in [213]. In this scenario, the

limited wireless resources can be utilized with high efficiency,

especially for massive access. Therefore, the convergence of

sensing, computation, and communication is an important

future direction for cellular IoT in B5G wireless networks.

IX. CONCLUSION

This paper provided a comprehensive review of massive

access in B5G wireless networks from different perspectives.

First, we summarized the basic characteristics of massive

access, such as low power, massive connectivity, and broad

coverage. Then, we surveyed information theoretical concepts

for massive access, focusing on massive random access and

massive short-packet access. Next, we discussed massive ac-

cess protocol design, with an emphasis on grant-free random

access protocols. In particular, we presented the sensing ma-

trix design and the corresponding device activity detection

algorithms, including optimization algorithms, greedy algo-

rithms, and Bayesian algorithms. Subsequently, we provided

an overview of massive orthogonal and non-orthogonal access

techniques, respectively. Furthermore, we identified challenges

for massive coverage enhancement in outdoor, indoor, and

rural environments. Finally, we discussed potential challenges

for providing massive access in B5G wireless networks and

pointed out some possible future research directions.

REFERENCES

[1] A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, “Internetof Things for smart cities,” IEEE Internet of Things J., vol. 1, no. 1, pp.22-32, Feb. 2014.

[2] N. Ahmed, D. De, and I. Hussain, “Internet of Things (IoT) for smartprecision agriculture and farming in rural areas,” IEEE Internet of ThingsJ., vol. 5, no. 6, pp. 4890-4899, Dec. 2018.

[3] L. D. Xu, W. He, and S. Li, “Internet of Things in industries: A survey,”IEEE Trans. Industiral Informatics, vol. 10, no. 4, pp. 2233-2243, Nov.2014.

[4] S. M. R. Islam, D. Kwak, M. H. Kabir, M. Hossain, and K-S. Kwak,“The Internet of Things for health care: A comprehensive survey,” IEEE

Access, vol. 3, pp. 678-708, Jun. 2015.

[5] Cisco, Cisco visual networking index: Global mobile data traffic forecastupdate, 2017-2022 white paper, Feb. 2019.

[6] Statista Research Department, “Internet of Things (IoT) connecteddevices installed base worldwide from 2015 to 2025 (in bil-lions),” [Online]: https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide, Nov. 2016.

[7] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash,“Internet of Things: A survey on enabling technologies, protocols, andapplications,” IEEE Commun. Surv. Tuts., vol. 17, no. 4, pp. 2347-2376,Jun. 2015.

[8] S. G. Varghese, C. P. Kurian, V. I. George, A. John, V. Nayak, andA. Upadhyay, “Comparative study of zigbee topologies for IoT-basedlighting automation,” IET Wireless Sensor Syst., vol. 9, no. 4, pp. 201-207, Jul. 2019.

[9] K-H. Chang, “Bluetooth: A viable solution for IoT?” IEEE Wireless

Commun., vol. 21, no. 6, pp. 6-7, Dec. 2014.

[10] S. R. Pokhrel and C. Williamson, “Modeling compound TCP over WiFifor IoT,” IEEE/ACM Trans. Netw., vol. 26, no. 2, pp. 864-878, Apr. 2018.

[11] U. Raza, P. Kulkarni, and M. Sooriyabandara, “Low power wide areanetworks: An overview,” IEEE Commun. Surv. Tuts., vol. 19, no. 2, pp.855-873, Jun. 2017.

[12] J. P. S. Sundaram, W. Du, and Z. Zhao, “A survey on LoRa networking:Research problems, current solutions and open issues,” IEEE Commun.Surv. Tuts., vol. 22, no. 1, pp. 371-388, Mar. 2020.

[13] A. I. Sulyman, S. M. A. Oteafy, and H. S. Hassanein, “Expandingthe cellular-IoT umbrella: An architectural approach,” IEEE Wireless

Commun., vol. 24, no. 3, pp. 66-71, Jun. 2017.

[14] 3GPP TR 45.820, Technical specification group GSM/EDGE radioaccess network; Cellular system support for ultra-low complexity andlow throughput Internet of Things (CIoT), Nov. 2015.

[15] X. Chen, Massive Access for Cellular Internet of Things Theory andTechnique, Germany: Springer, 2019.

[16] Y. Cai, Z. Qin, F. Cui, G. Y. Li, and J. A. McCann, “Modulation andmultiple access for 5G networks,” IEEE Comm. Surv. Tuts., vol. 20, no.1, pp. 829-846, Mar. 2018.

[17] Y. Watanabe and K. Kamoi, “A formulation of the channel capacity ofmultiple-access channel,” IEEE Trans. Inf. Theory, vol. 55, no. 5, pp.2083-2096, May 2009.

[18] H. H. Permuter, T. Weissman, and J. Chen, “Capacity region of the finite-state multiple-access channel with and without feedback,” IEEE Trans.

Inf. Theory, vol. 55, no. 6, pp. 2455-2477, Jun. 2009.

[19] Y. Polyanskiy, H. V. Poor, and S. Verdu, “Channel coding rate in thefinite blocklength regime,” IEEE Trans. Inf. Theory, vol. 56, no. 5, Apr.2010.

[20] M. Hasan, E. Hossain, and D. Niyato, “Random access for machine-to-machine communication in LTE-advanced networks: Issues and ap-proaches,” IEEE Commun. Mag., vol. 51, no. 6, pp. 86-93, Jun. 2013.

[21] 3GPP TS 36.321 V9.3.0, “Evolved Universal Terrestrial Radio Access(E-UTRA); Medium Access Control (MAC),” Jun. 2010.

[22] N. H. Nguyen, B. Berscheid, and H. H. Nguyen, “Fast-OFDM withindex modulation for NB-IoT,” IEEE Commun. Lett., vol. 23, no. 7, pp.1157-1160, Jul. 2019.

[23] M. Zeng, A. Yadav, O. A. Dobre, G. I. Tsiropoulos, and H. V. Poor,“On the sum rate of MIMO-NOMA and MIMO-OMA systems,” IEEEWireless Commun. Lett., vol. 6, no. 4, pp. 534-537, Aug. 2017.

[24] J. Xu, J. Yao, L. Wang, Z. Ming, K. Wu, and L. Chen, “NarrowbandInternet of Things: Evolutions, technologies, and open issues,” IEEEInternet of Things J., vol. 5, no. 3, pp. 1149-1162, Jun. 2018.

[25] H-M. Wang, Q. Yang, Z. Ding, and H. V. Poor, “Secure short-packetcommunications for mission-critical IoT applications,” IEEE Trans. Wire-

less Commun., vol. 18, no. 5, pp. 2565-2578, May 2019.

Page 18: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

18

[26] X. Chen and Y. Zhang, “Mode selection in MU-MIMO downlinknetworks: A physical layer security perspective,” IEEE Syst. J., vol. 11,no. 2, pp. 1128-1136, Jun. 2017.

[27] P. Popovski, J. J. Nielsen, C. Stefanovic, E. de Carvalho, E. Strom, K.F. Trillngsgaard, A-S. Bana, D. M. Kim, R. Kotaba, J. Park, and R. B.Sorensen, “Wireless access for ultra-reliable low-latency communication:Principles and building blocks,” IEEE Netw., vol. 32, no. 2, pp. 16-23,Mar. 2018.

[28] C. Bockelmann, N. Pratas, H. Nikopour, K. Au, T. Svensson, C.Stefanovic, P. Popovski, and A. Dekorsy, “Massive machine-type com-munications in 5G: Physical and MAC-layer solutions,” IEEE Commun.

Mag., vol. 54, no. 9, pp. 59-65, Sep. 2016.[29] Y. D. Beyene, R. Jantti, K. Ruttik, and S. Iraji, “On the performance

of narrow-band Internet of Things (NB-IoT),” in Proc. IEEE Wireless

Commun. Netw. Conf. (WCNC), San Francisco, CA, USA, 2017, pp. 1-6.[30] L. Liu, E. G. Larsson, W. Yu, P. Popovski, C. Stefanovic, and E. de

Carvalho, “Sparse signal processing for grant-free massive connectivity:A future paradigm for random access protocols in the Internet of Things,”IEEE Signal Process. Mag., vol. 35, no. 5, pp. 88-99, Sep. 2018.

[31] A-S. Bana, E. de Carvalho, B. Soret, T. Abrao, J. C. Marinello, E. G.Larsson, and P. Popovski, “Massive MIMO for Internet of Things (IoT)connectivity,” Physical Commun., vol. 35, pp. 1-17, Sep. 2019.

[32] Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan, and L. Hanzo,“Nonorthogonal multiple access for 5G and beyond,” Proc. IEEE, vol.105, no. 12, pp. 2347-2381, Dec. 2017.

[33] Q. Qi, X. Chen, L. Lei, C. Zhong, Z. Zhang, “Outage-constrained robustdesign for sustainable B5G cellular Internet of Things,” IEEE Trans.Wireless Commun., vol. 18, no. 12, pp. 5780-5790, Dec. 2019.

[34] S. A. Busari, K. M. S. Huq, S. Mumtaz, and J. Rodriguez, “Terahertzmassive MIMO for beyond-5G wireless communications,” in Proc. IEEE

Intern. Conf. Commun. (ICC), Shanghai, China, Jun. 2019, pp. 1-6.[35] M. E. Morocho-Cayamcela, H. Lee, and W. Lim, “Machine learning for

5G/B5G mobile and wireless communications: Potential, limitations, andfuture directions,” IEEE Access, vol. 7, pp. 137184-137206, 2019.

[36] L. Zhang, Y-C. Liang, and D. Niyato, “6G visions: Mobile ultra-broadband, super Internet of Things, and artificial intelligent,” China

Commun., vol. 16, no. 8, pp. 1-14, Aug. 2019.[37] M. R. Palattella, M. Dohler, A. Grieco, G. Rizzo, J. Torsner, T. Engel,

and L. Ladid, “Internet of Things in the 5G era: Enablers, architecture,and business models,” IEEE J. Sel. Areas Commun., vol. 34, no. 3, pp.510-527, Mar. 2016.

[38] G. Durisi, T. Koch, and P. Popovski, “Toward massive, ultrareliable, andlow-latency wireless communication with short packets,” Proc. IEEE, vol.104, no. 9, pp. 1711-1726, Sep. 2016.

[39] L. Cheng, B. Henty, F. Bai, and D. D. Stancil, “Doppler spread andcoherence time of rural and highway vehicle-to-vehicle channels at5.9 GHz,” in Proc. IEEE Global Commun. Conf. (GLOBECOM), NewOrleans, LO, USA, Dec. 2008, pp. 1-6.

[40] Z. Tang, J. Wang, J. Wang, and J. Song, “Device activity detectionand non-coherent information transmission for massive machine-typecommunications,” IEEE Access, vol. 8, pp. 41452-41465, Feb. 2020.

[41] C. Zhu, J. Mietzner, and R. Schober, “On the performance of non-coherent transmission schemes with equal-gain combining in generalizedK-fading,” IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1337-1349,Apr. 2010.

[42] S-C. Chang and E. Weldon, “Coding for T-user multiple-access chan-nels,” IEEE Trans. Inf. Theory, vol. 25, no. 6, pp. 684-691, Nov. 1979.

[43] J. A. Gubner, “On the capacity region of the discrete additive multiple-access arbitrarily varying channel,” IEEE Trans. Inf. Theory, vol. 38, no.4, pp. 1344-1347, Jul. 1992.

[44] J. Harshan and B. S. Rajan, “On two-user Gaussian multiple accesschannels with finite input constellations,” IEEE Trans. Inf. Theory, vol.57, no. 3, pp. 1299-1327, Mar. 2011.

[45] T. M. Cover and J. A. Thomas, Elements of Information Theory, 2nded. Hoboken, NJ, USA: Wiley, 2006.

[46] X. Chen and D. Guo, “Gaussian many-access channels: Definition andsymmetric capacity,” in Proc. IEEE Inf. Theory Workshop, Seville, Spain,Sep. 2013, pp. 1-5.

[47] X. Chen and D. Guo, “Many-access channels: The Gaussian case withrandom user activities,” in Proc. IEEE Int. Symp. Inf. Theory, Honolulu,HI, USA, Jun. 2014, pp. 3127-3131.

[48] X. Chen, T-Y. Chen, and D. Guo, “Capacity of Gaussian many-accesschannels,” IEEE Trans. Inf. Theory, vol. 63, no. 6, pp. 3516-3539, Jun.2017.

[49] F. Boccardi, R. W. Heath, A. Lozano, T. L. Marzetta, and P. Popovski,“Five disruptive technology directions for 5G,” IEEE Commun. Mag., vol.52, no. 2, pp. 74-80, Feb. 2014.

[50] V. W. S. Wong, R. Schober, D. W. K. Ng, and L.-C. Wang, Key

Technologies for 5G Wireless Systems. Cambridge, U.K.: CambridgeUniv. Press, 2017.

[51] F. Wei, Y. Wu, W. Chen, W. Yang, and G. Caire, “On the fundamentallimits of MIMO massive multiple access channels,” in Proc. IEEE Intern.

Conf. Commun. (ICC), Shanghai, China, May 2019, pp. 1-6.

[52] T. Kim and I. Bang, “An enhanced random access with preamble-assisted short-packet transmission for cellular IoT communications,”IEEE Commun. Lett., vol. 23, no. 6, pp. 1081-1084, Jun. 2019.

[53] L. Zhang and Y-C. Liang, “Average throughput analysis and optimizationin cooperative IoT networks with short packet communication,” IEEETrans. Veh. Technol., vol. 67, no. 12, pp. 11549-11562, Dec. 2018.

[54] G. Durisi, T. Koch, J. Ostman, Y. Polyanskiy, and W. Yang, “Short-packet communications over multiple-antenna Rayleigh-fading channels,”IEEE Trans. Commun., vol. 64, no. 2, pp. 618-629, Feb. 2016.

[55] S. Verdu, “Fifty years of Shannon theory,” IEEE Trans. Inf. Theory, vol.44, no. 6, pp. 2057-2078, Oct. 1998.

[56] L. Zheng and D. Tse, “Diversity and multiplexing: A fundamentaltradeoff in multiple-antenna channels,” IEEE Trans. Inf. Theory, vol. 49,no. 5, pp. 1073-1096, May 2003.

[57] G. Ozcan and M. C. Gursoy, “Throughput of cognitive radio systemswith finite blocklength codes,” IEEE J. Sel. Areas Commun., vol. 31, no.11, pp. 2541-2554, Nov. 2013.

[58] A. Rajandekar and B. Sikdar, “A survey of MAC layer issues andprotocols for machine-to-machine communications,” IEEE Internet of

Things J., vol. 2, no. 2, pp. 175-186, Apr. 2015.

[59] C. Tang, L. Song, J. Bagadeesh, S. Wu, S. Biaz, Q. Yang, and H. Wang,“Comparative investigation on CSMA/CA-based opportunistic randomaccess for Internet of Things,” IEEE Internet of Things J., vol. 1, no.2, pp. 171-179, Apr. 2019.

[60] H. Seo, J-P. Hong, and W. Choi, “Low latency random access forsporadic MTC devices in Internet of Things,” IEEE Internet of Things J.,vol. 6, no. 3, pp. 5108-5118, Jun. 2019.

[61] Y. Polyanskiy, “A perspective on massive random access,” in Proc. IEEE

Intern. Symp. Inf. Theory (ISIT), Aachen, Germany, Jun. 2017, pp. 2523-2527.

[62] M. Centenaro, L. Vangelista, S. Saur, A. Weber, and V. Braun, “Compar-ison of collision-free and contention-based radio access protocols for theInternet of Things,” IEEE Trans. Commun., vol. 65, no. 9, pp. 3832-3846,Sep. 2017.

[63] A. T. Abebe and C. G. Kang, “Comprehensive grant-free random accessfor massive & low latency communication,” in Proc. IEEE Intern. Conf.

Commun. (ICC), Paris, France, May 2017, pp. 1-6.

[64] X. Shao, X. Chen, C. Zhong, J. Zhao, and Z. Zhang, “Protocol designand analysis for cellular Internet of Things with massive access,” in Proc.IEEE Intern. Conf. Commun. (ICC), Shanghai, China, May 2019, pp. 1-6.

[65] L. Liu and W. Yu, “Massive device connectivity with massive MIMO,”in Proc. IEEE Intern. Symp. Inf. Theory (ISIT), Aachen, Germany, Jun.2017, pp. 1-5.

[66] K. Senel and E. G. Larsson, “Grant-free massive MTC-enabled massiveMIMO: A compressive sensing approach,” IEEE Trans. Commun., vol.66, no. 12, pp. 6164-6175, Dec. 2018.

[67] Z. Chen, F. Sohrabi, and W. Yu, “Sparse activity detection for massiveconnectivity,” IEEE Trans. Signal Process., vol. 66, no. 7, pp. 1890-1904,Apr. 2018.

[68] J. Ding and J. Choi, “Comparison of preamble structures for grant-freerandom access in massive MIMO systems,” IEEE Wireless Commun. Lett.,vol. 9, no. 2, pp. 166-170, Feb. 2020.

[69] L. Liu and W. Yu, “Massive connectivity with massive MIMO-part I:Device activity detection and channel estimation,” IEEE Trans. Signal

Process., vol. 66, no. 11, pp. 2933-2946, Jun. 2018.

[70] X. Shao, X. Chen, C. Zhong, J. Zhao, and Z. Zhang, “A unified designof massive access for cellular Internet of Things,” IEEE Internet of ThingsJ., vol. 6. no. 2, pp. 3934-3947, Apr. 2019.

[71] J. Wang, Z. Zhang, and L. Hanzo, “Joint active user detection andchannel estimation in massive access systems exploiting Reed-Mullersequences,” IEEE J. Sel. Topics Signal Process., vol. 13, no. 3, pp. 739-752, Jun. 2019.

[72] S. Li, W. Zhang, Y. Cui, H. V. Cheng, and W. Yu, “Joint design ofmeasurement matrix and sparse support recovery method via deep auto-encoder”, IEEE Signal Process. Lett., vol. 26, no. 12, pp. 1778-1782,Dec. 2019.

[73] S. Mousavi, M. M. R. Taghiabadi, and R. Ayanzadeh, “A survey oncompressive sensing: Classical results and recent advancements,” Aug.2019. [Online]: arXiv:1908.01014v1.

Page 19: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

19

[74] D. L. Donoho and J. Tanner, “Sparse nonnegative solution of underde-termined linear equations by linear programming,” Proc. Nat. Acad. Sci.USA, vol. 102, no. 27, pp. 9446-9451, Jul. 2005.

[75] E. J. Candes, J. K. Romberg, and T. Tao, “Stable signal recovery fromincomplete and inaccurate measurements,” Commun. Pure Appl. Math.,vol. 59, no. 8, pp. 1207-1223, Aug. 2006.

[76] S. J. Kim, K. Koh, M. Lustig, S. Boyd, and D. Gorinevsky, “An interior-point method for large-scale l1-regularized least squares,” IEEE J. Sel.

Topics Signal Process., vol. 1, no. 4, pp. 606-617, Dec. 2007.

[77] M. Golbabaee and P. Vandergheynst, “Compressed sensing of simulta-neous low-rank and joint-sparse matrices,” [Online]: arXiv preprint arXiv:1211.5058, Nov. 2012.

[78] X. Shao, X. Chen, and R. Jia, “Low-complexity design of massive devicedetection via Riemannian pursuit,” in Proc. IEEE Global Commun. Conf.

(GLOBECOM), Waikoa, USA, Dec. 2019, pp. 1-6.

[79] C. Bockelmann, H. F. Schepker, and A. Dekorsy, “Compressive sens-ing based multi-user detection for machine-to-machine communication,”Trans. Emerging Telecommun. Technol., vol. 24, no. 4, pp. 389-400, Apr.2013.

[80] I. Roth, M. Kliesch, G. Wunder, and J. Eisert. “Reliable recovery ofhierarchically sparse signals and application in machine-type communi-cations,” [Online]: arXiv preprint arXiv:1612.07806, Dec. 2016.

[81] G. Wunder, I. Roth, R. Fritschek, and J. Eisert “Performance ofhierarchical sparse detectors for massive MTC,” [Online]: arXiv preprintarXiv:1806.02754, Oct. 2018.

[82] X. Xu, X. Rao, and V. K. N. Lau, “Active user detection and channelestimation in uplink CRAN systems,” Proc. IEEE Inter. Conf. Commun.

(ICC), London, UK, pp. 2727-2732, Jun. 2015.

[83] Z. Utkovski, O. Simeone, T. Dimitrova, and P. Popovski, “Random ac-cess in C-RAN for user activity detection with limited-capacity fronthaul,”IEEE Signal Process. Lett., vol. 24, no. 1, pp. 17-21, Jan. 2017.

[84] X. Shao, X. Chen, C. Zhong, and Z. Zhang, “Joint activity detection andchannel estimation for mmW/THz wideband massive access,” in Proc.

IEEE Intern. Conf. Commun. (ICC), Dublin, Ireland, Jun. 2020, pp. 1-6.

[85] M. Ke, Z. Gao, Y. Wu, X. Gao, and R. Schober, “Compressive sensing-based adaptive active user detection and channel estimation: Massiveaccess meets massive MIMO,” IEEE Trans. Signal Process., vol. 68, pp.764-779, Jan. 2020.

[86] Q. He, T. Q. S. Quek, Z. Chen, Q. Zhang, and S. Li, “Compressive chan-nel estimation and multi-user detection in C-RAN with low complexitymethods,” IEEE Trans. Wireless Commun., vol. 17, no. 6, pp. 3931-3944,Jun. 2018.

[87] L. Liu and W. Yu, “Massive connectivity with massive MIMO-part II:Achievable rate characterization,” IEEE Trans. Signal Process., vol. 66,no. 11, pp. 2947-2959, Jun. 2018.

[88] J. Ahn, B. Shim, and K. B. Lee, “EP-based joint active user detectionand channel estimation for massive machine-type communications,” IEEETrans. Commun., vol. 67, no. 7, pp. 5178-5189, Jul. 2019.

[89] Z. Sun, Z. Wei, L. Yang, J. Yuan, X. Cheng, and L. Wan, “Exploitingtransmission control for joint user identification and channel estimationin massive connectivity,” IEEE Trans. Commun., vol. 67, no. 9, pp. 6311-6326, Sep. 2019.

[90] J. Zhang, Y. Pan, and J. Xu, “Compressive sensing for joint user activityand data detection in grant-free NOMA,” IEEE Wireless Commun. Lett.,vol. 8, no. 3, pp. 857-860, Jun. 2019.

[91] B. K. Jeong, B. Shim, and K. B. Lee, “MAP-based active user and datadetection for massive machine-type communications,” IEEE Trans. Veh.

Technol., vol. 67, no. 9, pp. 8481-8494, Sep. 2018.

[92] B. Wang, L. Dai, Y. Zhang, T. Mir, and J. Li, “Dynamic compressivesensing-based multi-user detection for uplink grant-free NOMA,” IEEECommun. Lett., vol. 20, no. 11, pp. 2320-2323, Nov. 2016.

[93] Y. Du, B. Dong, Z. Chen, X. Wang, Z. Liu, P. Gao, and S. Li, “Efficientmulti-user detection for uplink grant-free NOMA: Prior-information aidedadaptive compressive sensing perspective,” IEEE J. Sel. Areas Commun.,vol. 35, no. 12, pp. 2812-2828, Dec. 2017.

[94] S. Haghighatshoar, P. Jung, and G. Caire, “Improved scaling law foractivity detection in massive MIMO systems,” in Proc. IEEE Intern.

Symp. Inf. Theory (ISIT), Vail, USA, Jun. 2018, pp. 381-385.

[95] A. Fengler, S. Haghighatshoar, P. Jung, and G. Caire, “Non-bayesianactivity detection, large-scale fading coefficient estimation, and un-sourced random access with a massive MIMO receiver,” [Online]:http://arxiv.org/abs/1910.11266, Oct. 2019.

[96] Z. Chen, F. Sohrabi, Y. Liu, and W. Yu, “Covariance based joint activityand data detection for massive random access with massive MIMO,” inProc. IEEE Intern. Conf. Commun. (ICC), Shanghai, China, 2019, pp.1-6.

[97] A. Fengler, G. Caire, P. Jung, and S. Haghighatshoar, “Massive MIMOunsourced random access,” [Online]: http://arxiv.org/abs/1901.00828, Jan.2019.

[98] V. K. Amalladinne, J-F. Chamberland, and K. R. Narayanan, “A codedcompresssed sensing scheme for uncoordinated multiple access,” [On-line]: https://arxiv.org/abs/1809.04745, Sep. 2018.

[99] E. de Carvalho, E. Bjornson, J. H. Sørensen, E. G. Larsson, and P.Popovski, “Random pilot and data access in massive MIMO for machine-type communications,” IEEE Trans. Wireless Commun., vol. 16, no. 12,pp. 7703-7717, Dec. 2017.

[100] Y. Han, B. D. Rao, and J. Lee, “Massive uncoordinated access withmassive MIMO: A dictionary learning approach,” IEEE Trans. Wireless

Commun., vol. 19, no. 2, pp. 1320-1332, Feb. 2020.

[101] T. L. Marzetta, “Noncooperative cellular wireless with unlimited num-bers of base station antennas,” IEEE Trans. Wireless Commun., vol. 9,no. 11, pp. 3590-3600, Nov. 2010.

[102] H. Q. Ngo, E. Larsson, and T. Marzetta, “Energy and spectral efficiencyof very large multiuser MIMO systems,” IEEE Trans. Commun., vol. 61,no. 4, pp. 1436-1449, Apr. 2013.

[103] D. W. K. Ng, E. S. Lo, and R. Schober, “Energy-efficient resourceallocation in OFDMA systems with large numbers of base stationantennas,” IEEE Trans. Wireless Commun., vol. 11, no. 9, pp. 3292-3304,Sep. 2012.

[104] R. Deng, Z. Jiang, S. Zhou, and Z. Niu, “How often should be CSI beupdated for massive MIMO systems with massive connectivity?” in Proc.

IEEE Global Commun. Conf. (GLOBECOM), Singapore, Singapore, Dec.2017, pp. 1-6.

[105] D. J. Love, R. W. Heath, V. K. N. Lau, D. Gesbert, B. D. Rao, and M.Andrews, “An overview of limited feedback in wireless communicationsystems,” IEEE J. Sel. Areas Commun., vol. 26, no. 8, pp. 1341-1365,Oct. 2008.

[106] J-C. Shen, J. Zhang, E. Alsusa, and K. B. Letaief, “Compressed CSIacquisition in FDD massive MIMO: How much training is needed?” IEEE

Trans. Wireless Commun., vol. 15, no. 6, pp. 4145-4156, Jun. 2016.

[107] Z. Gao, L. Dai, W. Dai, B. Shim, and Z. Wang, “Structured compressivesensing-based spatio-temporal joint channel estimation for FDD massiveMIMO,” IEEE Trans. Commun., vol. 64, no. 2, pp. 601-617, Feb. 2016.

[108] W. Shen, L. Dai, B. Shim, S. Mumtaz, and Z. Wang, “Joint CSITacquisition based on low-rank matrix completion for FDD massive MIMOsystems,” IEEE Commun. Lett., vol. 19, no. 12, pp. 2178-2181, Dec. 2015.

[109] C-K. Wen, W-T. Shih, and S. Jin, “Deep learning for massive MIMOCSI feedback,” IEEE Wireless Commun. Lett., vol. 7, no. 5, pp. 748-751,Oct. 2018.

[110] T. L. Marzetta, E. G. Larsson, H. Yang, and H. Q. Ngo, Fundamental

of Massive MIMO, UK: Cambridge University Press, 2016.

[111] O. Elijah, C. Y. Leow, T. A. Rahman, S. Nunoo, and S. Z. Iliya,“A comprehensive survey of pilot contamination in massive MIMO-5Gsystem,” IEEE Commun. Surv. Tuts., vol. 18, no. 2, pp. 905-923, Jun.2016.

[112] H. V. Cheng, E. Bjornson, and E. G. Larsson, “Optimal pilot andpayload power control in single-cell massive MIMO systems,” IEEE

Trans. Signal Process., vol. 65, no. 9, pp. 2363-2378, May 2017.

[113] D. W. K. Ng, E. S. Lo, and R. Schober, “Energy-efficient resourceallocation in multi-cell OFDMA systems with limited backhaul capacity,”IEEE Trans. Wireless Commun., vol. 11, no. 10, pp. 3618–3631, Sep.2012.

[114] L. Liang, W. Xu, and X. Dong, “Low-complexity hybrid precoding inmassive multiuser MIMO systems,” IEEE Wireless Commun. Lett., vol.3, no. 6, pp. 653-656, Dec. 2014.

[115] F. Sohrabi and W. Yu, “Hybrid digital and analog beamforming designfor large-scale antenna arrays”, IEEE J. Sel. Topics Signal Process., vol.10, no. 3, pp. 501-513, April 2016.

[116] Z. Wei, D. W. K. Ng, and J. Yuan, “NOMA for hybrid mmwavecommunication systems with beamwidth control,” IEEE J. Sel. Topics

in Signal Process., vol. 13, no. 3, pp. 567–583, Mar. 2019.

[117] Q. Shi and M. Hong, “Spectral efficiency optimization for millimeterwave multiuser MIMO systems,” IEEE J. Sel. Topics Signal Process., vol.12, no. 3, pp. 455-468, Jun. 2018.

[118] A. Liu, V. K. N. Lau, and M-J. Zhao, “Stochastic successive convexoptimization for two-timescale hybrid precoding in massive MIMO,”IEEE J. Sel. Topics Signal Process., vol. 12, no. 3, pp. 432-444, Jun.2018.

[119] L. Fan, S. Jin, C-K. Wen, and H. Zhang, “Uplink achievable rate formassive MIMO systems with low-resolution ADC,” IEEE Commun. Lett.,vol. 19, no. 12, pp. 2186-2189, Dec. 2015.

Page 20: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

20

[120] S. Wang, Y. Li, and J. Wang, “Multiuser detection in massive spatialmodulation MIMO with low-resolution ADCs,” IEEE Trans. WirelessCommun., vol. 14, no. 4, pp. 2156-2168, Apr. 2015.

[121] G. Yu, X. Chen, and D. W. K. Ng, “Low-cost design of massive accessfor cellular Internet of Things,” IEEE Trans. Commun., vol. 67, no. 11,pp. 8008-8020, Nov. 2019.

[122] W. Roh, J-Y. Seol, J. Park, B. Lee, J. Lee, Y. Kim, J. Cho, K.Cheun, and F. Aryanfar, “Millimeter-wave beamforming as an enablingtechnology for 5G cellular communications: Theoretical feasibility andprototype results,” IEEE Commun. Mag., vol. 52, no. 2, pp. 106-113,Feb. 2014.

[123] R. W. Heath, N. Gonzalez-Prelcic, S. Rangan, W. Roh, and A. M.Sayeed, “An overview of signal processing techniques for millimeter waveMIMO systems,” IEEE J. Sel. Topics Signal Process., vol. 10, no. 3, pp.436-452, Apr. 2016.

[124] T. S. Rappaport, Y. Xing, G. R. MacCartney, A. F. Molisch, E. Mellios,and J. Zhang, “Overview of millimeter wave communications for fifth-generation (5G) wireles networks-with a focus on propagation model,”IEEE Trans. Ant. Propa., vol. 65, no. 12, pp. 6213-6230, Dec. 2017.

[125] C. Han, Y. Wu, Z. Chen, and X. Wang, “Terahertz communications(TeraCom): Challenges and impact on 6G wireless systems,” [Online]:arXiv:1912.06040v2, Dec. 2019.

[126] Z. Zhang, Y. Liang, W. Shi, L. Yuan, and G. Gui, “l1,2-regularization-based super-resolution sparse channel estimation for mmwave massiveMIMO systems,” IEEE Access, vol. 7, pp. 75837-75844, 2019.

[127] F. Bellili, F. Sohrabi, and W. Yu, “Generalized approximate messagepassing for massive MIMO mmwave channel estimation with Laplacianprior,” IEEE Trans. Commun., vol. 67, no. 5, pp. 3205-3219, May 2019.

[128] X. Hu, C. Zhong, X. Chen, W. Xu, and Z. Zhang, “Cluster groupingand power control for angle-domain mmwave MIMO NOMA systems,”IEEE J. Sel. Topics Signal Process., vol. 13, no. 5, pp. 1167-1180, Sep.2019.

[129] C. Liu, M. Li, S. V. Hanly, I. B. Collings, and P. Whiting, “Millimeterwave beam alignment: Large deviations analysis and design insights,”IEEE J. Sel. Areas Commun., vol. 35, no. 7, pp. 1619-1631, Jul. 2017.

[130] L. Dai, B. Wang, Y. Yuan, S. Han, C. L. I, and Z. Wang, “Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities,and future research trends,” IEEE Commun. Mag., vol. 53, no. 9, pp.74-81, Sep. 2015.

[131] M. Shirvnimoghaddam, M. Condoluci, M. Dohler, and S. J. Johnson,“On the fundamental limits of random non-orthogonal multiple access incellular massive IoT,” IEEE J. Sel. Areas Commun., vol. 35, no. 10, pp.2238-2252, Oct. 2017.

[132] Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan, and V. K.Bhargava, “A survey on non-orthogonal multiple access for 5G networks:Research challenges and future trends,” IEEE J. Sel. Areas Commun., vol.35, no. 10, pp. 2181-2195, Oct. 2017.

[133] Z. Wei, D. W. K. Ng, J. Yuan, and H. Wang, “Optimal resourceallocation for power-efficient MC-NOMA with imperfect channel stateinformation,” IEEE Trans. Commun., vol. 65, no. 9, pp. 3944–3961, Sep.2017.

[134] X. Chen, Z. Zhang, C. Zhong, and R. Jia, “On the design of mas-sive access,” in Proc. Intern. Conf. Wireless Commun. Signal Process.

(WCSP), Nanjing, China, Oct. 2017, pp. 1-6.

[135] S. M. R. Islam, N. Avazov, O. A. Dobre, and K-S. Kwak, “Power-domain non-orthogonal multiple access (NOMA) in 5G: potentials andchallenges,” IEEE Commun. Surv. Tuts., vol. 19, no. 2, pp. 721-742, Jun.2017.

[136] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, “On the performance ofnonorthogonal multiple access in 5G systems with randomly deployedusers,” IEEE Signal Process. Lett., vol. 21, no. 12, pp. 1501-1505, Dec.2014.

[137] J. Choi, “Power allocation for max-sum rate and max-min rate pro-portional fairness in NOMA,” IEEE Commun. Lett., vol. 20, no. 10, pp.2055-2058, Oct. 2016.

[138] X. Chen and R. Jia, “Exploiting rateless coding for massive access,”IEEE Trans. Veh. Technol., vol. 67, no. 11, pp. 11253-11257, Nov. 2018.

[139] Y. Liu, M. Elkashlan, Z. Ding, and G. K. Karagiannidis, “Fairness ofuser clustering in MIMO non-orthogonal multiple access systems,” IEEECommun. Lett., vol. 20, no. 7, pp. 1465-1468, Jul. 2016.

[140] Y. Sun, D. W. K. Ng, J. Zhu, and R. Schober, “Robust and secureresource allocation for full-duplex MISO multicarrier NOMA aystems,”IEEE Trans. Commun., vol. 66, no. 9, pp. 4119-4137, Sep. 2018.

[141] X. Chen, Z. Zhang, C. Zhong, and D. W. K. Ng, “Exploiting multiple-antenna for non-orthogonal multiple access,” IEEE J. Sel. Areas Com-

mun., vol. 35, no. 10, pp. 2207-2220, Oct. 2017.

[142] F. Tian and X. Chen, “Multiple-antenna techniques in nonorthogonalmultiple access: A review,” Front. Inform. Technol. Electron. Eng., vol.20, no. 12, pp. 1665-1697, Dec. 2019.

[143] X. Chen, Z. Zhang, C. Zhong, R. Jia, and D. W. K. Ng, “Fully non-orthogonal communication for massive access,” IEEE Trans. Commun.,vol. 66, no. 4, pp. 1717-1731, Apr. 2018.

[144] X. Chen, R. Jia, and D. W. K. Ng, “On the design of massivenon-orthogonal multiple access with imperfect successive interferencecancellation,” IEEE Trans. Commun., vol. 67, no. 3, pp. 2539-2551, Mar.2019.

[145] R. Jia, X. Chen, C. Zhong, D. W. K. Ng, H. Lin, and Z. Zhang, “Designof non-orthogonal beamspace multiple access for cellular Internet-of-Things,” IEEE J. Sel. Topics Signal Process., vol. 13, no. 3, pp. 538-552,Jun. 2019.

[146] L. Dai, B. Wang, Z. Ding, Z. Wang, S. Chen, and L. Hanzo, “A surveyof non-orthogonal multiple access for 5G,” IEEE Commun. Surv. Tuts.,vol. 20, no. 3, pp. 2294-2323, Sep. 2018.

[147] Y. Du, B. Dong, P. Gao, Z. Chen, J. Fang, and S. Wang, “Low-complexity LDS-CDMA detection based on dynamic factor graph,” inProc. IEEE Global Commun. Conf. Workshops (GC Wkshps), Washington,USA, Dec. 2016, pp. 1-6.

[148] R. Razavi, M. AL-Imari, M. A. Imaran, R. Hoshyar, and D. Chen, “Onreceiver design for uplink low density signature OFDM (LDS-OFDM),”IEEE Trans. Commun., vol. 60, no. 11, pp. 3499-3508, Nov. 2012.

[149] Z. Yuan, C. Yan, Y. Yuan, and W. Li, “Blind multiple user detection forgrant-free MUSA without reference signal,” in Proc. IEEE Veh. Technol.Conf. (VTC), Toronto, Canada, Sep. 2017, pp. 1-5.

[150] M. Vameghestahbanati, I. D. Marsland, R. H. Gohary, and H.Yanikomeroglu, “Multimensional constellations for uplink SCMAsystems-a comparative study,” IEEE Commun. Surv. Tuts., vol. 21, no.3, pp. 2169-2194, Sep. 2019.

[151] F. Wei and W. Chen, “Low complexity iterative receiver design forsparse code multiple access,” IEEE Trans. Commun., vol. 65, no. 2, pp.621-634, Feb. 2017.

[152] F. Wei, W. Chen, Y. Wu, J. Ma, and T. A. Tsiftsis, “Message-passingreceiver design for joint channel estimation and data decoding in uplinkgrant-free SCMA systems,” IEEE Trans. Wireless Commun., vol. 18, no.1, pp. 167-181, Jan. 2019.

[153] E. Becirovic, E. Bjornson, and E. G. Larsson, “How much will tinyIoT nodes profit from massive base station arrays,” in Proc. European

Signal Processing Conference (EUSIPCO), Rome, Italy, Sep. 2018, pp.832-836.

[154] J. Zhang, S. Chen, Y. Lin, J. Zheng, B. Ai, and L. Hanzo, “Cell-freemassive MIMO: A new next-generation paradigm,” IEEE Access, vol. 7,pp. 99878-99888, Jul. 2019.

[155] P. Liu, K. Luo, D. Chen, and T. Jiang, “Spectral efficiency analysisof cell-free massive MIMO systems with zero-forcing detector,” IEEE

Trans. Wireless Commun., vol. 19, no. 2, pp. 795-807, Feb. 2020.

[156] H. Q. Ngo, A. Ashikhmin, H. Yang, E. Larsson, and T. L. Marzetta,“Cell-free massive MIMO versus small cells,” IEEE Trans. Wireless

Commun., vol. 16, no. 3, pp. 1834-1850, Mar. 2017.

[157] T. Nakamura, S. Nagata, A. Benjebbour, Y. Kishiyama, T. Hai, X.Shen, N. Yang, and N. Li, “Trends in small cell enhancements in LTEadvanced,” IEEE Commun. Mag., vol. 51, no. 2, pp. 98-105, Feb. 2013.

[158] E. Nayebi, A. Ashikhmin, T. L. Marzetta, H. Yang, and B. D. Rao,“Precoding and power optimization in cell-free massive MIMO systems,”IEEE Trans. Wireless Commun., vol. 16, no. 7, pp. 4445-4459, Jul. 2017.

[159] X. Hu, C. Zhong, X. Chen, W. Xu, H. Lin, and Z. Zhang, “Cell-free massive MIMO systems with low resolution ADCs,” IEEE Trans.

Commun., vol. 67, no. 10, pp. 6844-6857, Oct. 2019.

[160] S. Feng, P. Setoodeh, and S. Haykin, “Smart home: Cognitive inter-active people-centric Internet of Things,” IEEE Commun. Mag., vol. 55,no. 2, pp. 34-39, Feb. 2017.

[161] L. Subrt and P. Pechac, “Intelligent walls as autonomous parts of smartindoor environments,” IET Commun., vol. 6, no. 8, pp. 1004-1010, Aug.2012

[162] X. Tan, Z. Sun, J. M. Jornet, and D. Pados, “Increasing indoor spectrumsharing capacity using smart reflect-array,” in Proc. IEEE Intern. Conf.

Commun. (ICC), Kuula Lumpur, May 2016, pp. 1-6.

[163] D. Xu, X. Yu, Y. Sun, D. W. K. Ng, and R. Schober, “Resourceallocation for secure IRS-assisted multiuser MISO systems,” in Proc.IEEE Global Commun. (GLOBECOM), Waikoloa, HI, USA, Dec. 2019,pp. 1-6.

[164] X. Yu, D. Xu, Y. Sun, D. W. K. Ng, and R. Schober, “Robust andsecure wireless communications via intelligent reflecting surface,” IEEE

J. Sel. Areas Commun., vol. PP, no. 99, pp. 1-1, 2020.

Page 21: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

21

[165] C. Huang, A. Zappone, M. Debbah, and C. Yuen, “Achievable ratemaximization by passive intelligent mirrors,” in Proc. IEEE Intern. Conf.Acous. Speech Signal Process. (ICCASP), Calgary, Canada, Apr. 2018,pp. 3714-3718.

[166] Q. Wu and R. Zhang, “Beamforming optimization for intelligentreflecting surface with discrete phase shifts,” in Proc. IEEE Intern. Conf.

Acous. Speech Signal Process. (ICCASP), Brighton, UK, May 2019, pp.1-7.

[167] E. Basar, M. D. Renzo, J. D. Rosny, M. Debbah, M-S. Alouini, andR. Zhang, “Wireless communications through reconfigurable intelligentsurface,” IEEE Access, vol. 7, pp. 116753-116773, Aug. 2019.

[168] Q. Wu and R. Zhang, “Intelligent reflecting surface enhanced wirelessnetwork via joint active and passive beamforming,” IEEE Trans. Wireless

Commun., vol. 18, no. 11, pp. 5394-5409, Nov. 2019.

[169] G. Yu, X. Chen, C. Zhong, D. W. K. Ng, and Z. Zhang, “Design,analysis and optimization of a large intelligent reflecting surface aidedB5G cellular Internet of Things,” IEEE Internet of Things J., vol. PP, no.99, pp. 1-1, 2020.

[170] N. Ahmed, D. De, and L. Hussain, “Internet of Things (IoT) for smartprecision agriculture and farming in rural areas,” IEEE Internet of ThingsJ., vol. 5, no. 6, pp. 4890-4899, Dec. 2018.

[171] H. Kaur and S. K. Sood, “Energy-efficient IoT-fog-cloud architecturalparadigm for real-time wildfire prediction and forecasting,” IEEE Syst.

J., vol. 14, no. 2, pp. 2003-2011, Jun. 2020.

[172] T. Qiu, Z. Zhao, T. Zhang, C. Chen, and C. L. P. Chen, “UnderwaterInternet of Things in smart ocean: System architecture and open issues,”IEEE Trans. Indus. Inf., vol. 16, no. 7, pp. 4297-4307, Jul. 2020.

[173] R. Briskman, “Domestic satellite services for rural areas,” IEEE Com-mun. Mag., vol. 22, no. 3, pp. 35-38, Mar. 1984.

[174] O. Kodheli, A. Guidotti, A. Vanelli-Coralli, “Integration of satellite in5G through LEO constellations,” in Proc. IEEE Global Commun. Conf.

(GLOBECOM), Sigapore, Singapore, Dec. 2017, 1-6.

[175] B. Di, L. Song, Y. Li, and H. V. Poor, “Ultra-dense LEO: integration ofsatellite access networks into 5G and beyond,” IEEE Wireless Commun.,vol. 26, no. 2, pp. 62-69, Apr. 2019.

[176] O. Kodheli, S. Andrenacci, N. Maturo, S. Chatzinotas, and F. Zimmer,“An uplink UE ground-based scheduling techniques for 5G mMTCsystems over LEO satellite,” IEEE Access, vol. 7, pp. 67413-67427, May2019.

[177] G. Zheng, S. Chatzinotas, and B. Ottersten, “Generic optimization oflinear precoding in multibeam satellite systems”, IEEE Trans. WirelessCommun., vol. 11, no. 6, pp. 2308-2320, Jun. 2012.

[178] L. You, A. Liu, W. Wang, and X. Gao, “Outage constrained robustmultigroup multicast beamforming for multi-beam satellite communica-tion systems,” IEEE Wireless Commun. Lett., vol. 8, no. 2, pp. 352-355,Apr. 2019.

[179] X. Zhu, C. Jiang, L. Yin, L. Kuang, N. Ge, and J. Lu, “Cooperativemultigroup multicast transmission in integrated terrestrial-satellite net-works,” IEEE J. Sel. Areas Commun., vol. 36, no. 5, pp.981-992, May2018.

[180] M. D. Sanctis, E. Cianca, G. Araniti, I. Bisio, and R. Prasad, “Satellitecommunications supporting internet of remote things,” IEEE Internet ofThings J., vol. 3, no. 1, pp. 113-123, Feb. 2016.

[181] X. Sun, N. Yang, S. Yan, Z. Ding, D. W. K. Ng, C. Shen, and Z.Zhong, “Joint beamforming and power allocation in downlink NOMAmultiuser MIMO networks,” IEEE Trans. Wireless Commun., vol. 17, no.8, pp. 5367-5381, Aug. 2018.

[182] M. Tian, Q. Zhang, S. Zhao, Q. Li, and J. Qin, “Robust beamformingin downlink MIMO NOMA networks using cutting-set method,” IEEE

Commun. Lett., vol. 22, no. 3, pp. 547-577, Mar. 2018.

[183] Y. Sun, D. W. K. Ng, J. Zhu, and R. Schober, “Robust and secureresource allocaton for full-duplex MISO multicarrier NOMA systems,”IEEE Trans. Commun., vol. 66, no. 9, pp. 4119-4137, Sep. 2018.

[184] X. Chen, Z. Zhang, H-H. Chen, and H. Zhang, “Enhancing wirelessinformation and power transfer by exploiting multi-antenna techniques,”IEEE Commun. Mag., vol. 53, no. 4, pp. 133-141, Apr. 2015.

[185] E. Boshkovska, D. W. K. Ng, N. Zlatanov, and R. Schober, “Practicalnon-linear energy harvesting model and resource allocation for SWIPTsystems”, IEEE Commun. Lett., vol. 19, no. 12, pp. 2082-2085, Dec.2015.

[186] C. Zhong, X. Chen, Z. Zhang, and G. Karagiannidis, “Wireless poweredcommunications: Performance analysis and optimization,” IEEE Trans.

Commun., vol. 63, no. 12, pp. 5178-5190, Dec. 2015.

[187] W. Na, J. Park, C. Lee, K. Park, J. Kim, and S. Cho, “Energy-efficient mobile charging for wireless power transfer in Internet of Thingsnetworks,” IEEE Internet of Things J., vol. 5, no. 1, pp. 79-92, Jan. 2018.

[188] D. Zhai, H. Chen, Z. Lin, Y. Li, and B. Vucetic, “Accumulatethen transmit: Multiuser scheduling in full-duplex wireless-powered IoTsystems,” IEEE Internet of Things J., vol. 5, no. 4, pp. 2753-2767, Aug.2018.

[189] X. Chen, C. Yuen, and Z. Zhang, “Wireless energy and informationtransfer tradeoff for limited feedback multi-antenna systems with energybeamforming,” IEEE Trans. Veh. Technol., vol. 63, no. 1, pp. 407-412,Jan. 2014.

[190] D. W. K. Ng, E. S. Lo, and R. Schober, “Robust beamforming forsecure communication in systems with wireless information and powertransfer,” IEEE Trans. Wireless Commun., vol. 13, no. 8, pp. 4599–4615,Aug. 2014.

[191] X. Chen, X. Wang, and X. Chen, “Energy-efficient optimization forwireless information and power transfer in large-scale MIMO systemsemploying energy beamforming,” IEEE Wireless Commun. Lett., vol. 2,no. 6, pp. 667-670, Dec. 2013.

[192] Z. Chen, P. Xu, Z. Ding, and X. Dai, “Cooperative transmission insimultaneous wireless inforamtion and power transfer networks,” IEEE

Trans. Veh. Technol., vol. 65, no. 10, pp. 8710-8715, Oct. 2016.

[193] H. Liang, C. Zhong, X. Chen, H. Suraweera, and Z. Zhang, “Wirelesspowered dual-hop multi-antenna relaying systems: Impact of CSI andantenna correlation,” IEEE Trans. Wireless Commun., vol. 16, no. 4, pp.2505-2519, Apr. 2017.

[194] Q. Qi and X. Chen, “Wireless powered massive access for cellularInternet of Things with imperfect SIC and non-linear EH,” IEEE Internet

of Things J., vol. 6, no. 2, pp. 3110-3120, Apr. 2019.

[195] W. Stallings, Cryptography and Network Security Principles and Prac-

tices, Prentice Hall PTR, 2006.

[196] J. L. Massey, “An introduction to contemporary cryptology,” Proc.

IEEE, vol. 76, no. 5, pp. 533-549, May 1988.

[197] Q. Qi, X. Chen, C. Zhang, and Z. Zhang, “Physical layer securityfor massive access in cellular Internet of Things,” SCIENCE CHINA Inf.

Sciences, vol. 63, no. 2, pp. 1-12, Feb. 2020.

[198] F. Shu, X. Wu, J. Hu, J. Li, R. Chen, and J. Wang, “Secure and precisewireless transmission for random-subcarrier-selection-based directionalmodulation,” IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 890-904,Jul. 2018.

[199] Y. Cai, Z. Wei, R. Li, D. W. K. Ng, and J. Yuan, “Joint trajectory andresource allocation design for energy-efficient secure UAV communica-tion systems,” IEEE Trans. Commun., vol. PP, no. 99, pp. 1-1, 2020.

[200] X. Chen, D. W. K. Ng, W. Gerstacker, and H-H. Chen, “A survey ofmultiple-antenna techniques for physical layer security,” IEEE Commun.

Surv. Tuts., vol. 19, no. 2, pp. 1027-1053, Jun. 2017.

[201] W. Wang, K. C. Teh, and K. H. Li, “Secrecy throughput maximizationfor MISO multi-eavesdropper wiretap channels,” IEEE Trans. Inf. Foren.

Security, vol. 12, no. 3, pp. 505-515, Mar. 2017.

[202] X. Zhang, M. R. McKay, X. Zhou, and R. W. Heath, “Artificial-noise-aided secure multi-antenna transmission with limited feedback,” IEEE

Trans. Wireless Commun., vol. 14, no. 5, pp. 2742-2754, May 2015.

[203] X. Chen, C. Yuen, and Z. Zhang, “Exploiting large-scale MIMOtechniques for physical layer security with imperfect channel state infor-mation,” in Proc. IEEE Global Commun. Conf. (GLOBECOM), Austin,USA, Dec. 2014.

[204] X. Chen, Z. Zhang, C. Zhong, D. W. K. Ng, and R. Jia, “Exploit-ing inter-user interference for secure massive non-orthogonal multipleaccess,” IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 788-801, Apr.2018.

[205] Z. Zhang, C. Jiao, and C. Zhong, “Impact of mobility on the uplinksum rate of MIMO-OFDMA cellular systems,” IEEE Trans. Commun.,vol. 65, no. 10, pp. 4218-4231, Oct. 2017.

[206] H. Zhang, H. Dai, Z. Zhang, and Y. Huang, “Mobile conductance insparse networks and mobility-connectivity tradeoff,” IEEE Trans. Wireless

Commun., vol. 15, no. 4, pp. 2954-2965, Apr. 2016.

[207] Z. Ding, R. Schober, P. Fan, and H. V. Poor, “OTFS-NOMA: Anefficient approach for exploiting heterogeneous user mobility profiles,”IEEE Trans. Commun., vol. 67, no. 11, pp. 7950-7965, Nov. 2019.

[208] X. Shao, X. Chen, and R. Jia, “A dimension reduction-based jointactivity detection and channel estimation algorithm for massive access,”IEEE Trans. Signal Process., vol. 68, pp. 420-435, 2020.

[209] M. Bennis, M. Debbah, and H. V. Poor, “Ultrareliable and low-latencywireless communication: Tail, risk, and scale,” Proc. IEEE, vol. 106, no.10, pp. 1834-1853, Oct. 2018.

[210] T. Wang, C-K. Wen, H. Wang, F. Gao, T. Jiang, and S. Jin, “Deeplearning for wireless physical layer: Opportunities and challenges,” China

Commun., vol. 14, no. 11, pp. 92-111, Nov. 2017.

Page 22: Massive Access for 5G and Beyonda comprehensive survey of aspects of massive access design for B5G wireless networks. Specifically, we provide a detailed review of massive access

22

[211] S-L. Huang, X. Xu, L. Zheng, and G. W. Wornell, “An informationtheoretic interpretation to deep neural networks,” in Proc. IEEE Int. Symp.Inf. Theory (ISIT), Paris, France, Jul. 2019, pp. 1984-1988.

[212] G. Zhu and K. Huang, “MIMO over-the-air computation for high-mobility multimodal sensing,” IEEE Internet of Things J., vol. 6, no.4, pp. 6089-6103, Aug. 2019.

[213] X. Chen and Q. Qi, Convergence of Energy, Communication and

Computation in B5G Cellular Internet of Things, Germany: Springer,2020.


Recommended